Академический Документы
Профессиональный Документы
Культура Документы
Publication Number
PLM00102 I
Proprietary and restricted rights notice
Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Index-1
Figures
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Prerequisites
You must have administrative privileges to perform most system and database tasks.
For additional information about defining and using administrative privileges, see
the Organization Guide.
Application Description
Organization Create and modify volumes and their properties. You can
also create and maintain your company’s virtual organization
within Teamcenter. Use this digital representation of your
company to manage user accounts, group accounts, and their
respective permissions.
For detailed information about this application, see the
Organization Guide.
Volume Migrate infrequently used files from a source volume to a
Management destination volume, without using third-party storage systems.
Create and manage migration policies for both hierarchical
storage management and volume management storage
methods.
For detailed information about this application, see the Volume
Management Guide.
Syntax definitions
This manual uses a set of conventions to define the syntax of Teamcenter commands,
functions, and properties. Following is a sample syntax format:
harvester_jt.pl [bookmark-file-name bookmark-file-name ...]
[directory-name directory-name ...]
The conventions are:
Bold Bold text represents words and symbols you must enter exactly
as shown.
In the preceding example, you enter harvester_jt.pl exactly as
shown.
Italic Italic text represents values that you supply.
In the preceding example, you supply values for bookmark-file-name
and directory-name.
text-text A hyphen separates two words that describe a single value.
In the preceding example, bookmark-file-name is a single value.
[] Brackets represent optional elements.
... An ellipsis indicates that you can repeat the preceding element.
Following are examples of correct syntax for the harvester_jt.pl: command, derived
from conventions used in the documentation:
harvester_jt.pl
harvester_jt.pl assembly123.bkm
harvester_jt.pl assembly123.bkm assembly124.bkm assembly125.bkm
harvester_jt.pl AssemblyBookmarks
Basic concepts
Teamcenter architecture
Two-tier architecture
The two-tier architectural model comprises the following tiers:
• Client tier
The client tier comprises the Teamcenter rich clients.
In a deployment of the two-tier architecture, the Teamcenter server runs on
the client workstation.
Note The two-tier rich client is installed only through TEM. Over-the-Web
installation is supported only for the four-tier rich client.
Some Teamcenter client features, such as Teamcenter Integration
for NX, Lifecycle Visualization, and Teamcenter Client for Microsoft
Office, require the Web tier, a component of the four-tier architecture.
To enable these features for a two-tier rich client, you can connect the
two-tier rich client to a deployment of the Web tier. For information
about functionality you can add to a rich client and which add-ons
require the Web tier, see the appropriate server installation guide (for
Windows or UNIX/Linux).
• Resource tier
The resource tier comprises a database server, database, volumes, and file
servers.
Two-tier architecture
In the two-tier model, you deploy the Teamcenter rich client, which includes the
local server, and the optional applications that integrate with the rich client on the
client workstation. Typically, the database server, volumes, and file servers are
installed on one or more separate hosts.
Teamcenter File Management System (FMS) manages the rich client access to
volumes:
• The FMS server cache (FSC) process run on the server hosting the volume.
• The FMS client cache (FCC) process runs on the rich client host.
For more information about FMS and two-tier rich client architecture, see the
appropriate Teamcenter server installation guide (for Windows or UNIX/Linux).
Two-tier deployment
Four-tier architecture
The four-tier architecture model comprises the following tiers:
• Client tier
The client tier comprises the Teamcenter rich client, thin client, and other clients
such as Teamcenter Client for Microsoft Office.
Note The rich client can be deployed with additional functionality, such as
Lifecycle Visualization, Teamcenter Client for Microsoft Office, and
Teamcenter Integration for NX or NX Integration 4.0.1. (Teamcenter
Integration for NX/NX Integration 3 is not supported.)
The J2EE Web tier is a Java application that runs in a Java 2 Enterprise Edition
(J2EE) application server, such as Oracle WebLogic, and is responsible for
communication between the client tier and enterprise tier. For information about
supported application servers, see the Siemens PLM Software Certification
Database:
http://support.industrysoftware.automation.siemens.com/
certification/teamcenter.shtml
• Enterprise tier
The enterprise tier comprises a configurable pool of Teamcenter C++ server
processes and a server manager. The enterprise tier retrieves data from and
stores data in the database.
A server manager manages a pool of Teamcenter server processes. You must
install a server manager whenever you deploy the Web tier.
Note Teamcenter provides server managers based on the J2EE and the
Microsoft .NET platforms. Install the appropriate server manager for
the Web tier you use. The .NET Web tier is supported only on Windows
platforms.
• Resource tier
The resource tier comprises a database server, database, volumes, and file
servers.
Four-tier architecture
You can design deployments that host the Web tier, resource tier, and enterprise
tiers on the same computer or on separate computers:
• Smaller sites can run the pool of servers and the server manager on the same
host as the Web tier.
• Larger sites can distribute the pool of server processes across multiple hosts
and optionally include an HTTP server to serve static files or multiple HTTP
servers to support load balancing.
For a multihost configuration, the server pool consists of multiple subpools, one
or more for each host. Each subpool is managed by one server manager process.
The Web tier balances the load across the server pools.
The Teamcenter J2EE based server manager and Web tier application both employ
the JBoss cache, a tree-structured cache, to provide replication and transaction
context. You must configure the JBoss cache (called TreeCache in Teamcenter) in
both the J2EE based server manager and the Web tier application.1
To ensure communication between the Web tier and the server manager, you must
coordinate the values you specify for each component. For some values, you must
provide the identical value when configuring the Web tier application.
If you are setting up multiple Web tier environments with separate domains, you
must configure:
• A minimum of one server manager for each Web tier deployment.
The JMX HTTP adapter allows you to view the status of the server pool and
dynamically alter the pool configuration values (the values are not persistent).
Access this functionality from the following URL:
http://host-name:jmx-port
Replace host-name with the name of the host running the server manager. Replace
jmx-port with the number of the port running the JMX HTTP adapter. This port
number is defined when you install the J2EE based server manager.
The first time you log on to the adapter, use manager for both the user name
and the password. You can change the user name and password to unique values
using the adapter.
Teamcenter File Management System (FMS) manages the rich client access to
volumes:
• The FMS client cache (FCC) process runs on the rich client host.
• The FMS server cache (FSC) process runs on each server hosting a volume and
each server hosting a pool of Teamcenter servers (TcServer).
Note If you install File Management System, the FMS server cache (FSC) and the
server manager must run on the same host server, with the same user ID.
1. This is not required if you use the .NET Web tier and the .NET based server manager.
Four-tier deployment (enterprise and Web tiers on separate hosts with HTTP server)
Four-tier deployment (multiple enterprise tier hosts and Web tier hosts)
Database server
A Teamcenter network requires access to a database server.
Before you install Teamcenter, you or your database administrator must install and
configure a database server to store Teamcenter data. The Teamcenter corporate
server must have access to a database server or a database client. Teamcenter
supports IBM DB2, Oracle, and Microsoft SQL Server databases.
For Oracle configuration settings and tuning methods to optimize Teamcenter
performance, see the Teamcenter Deployment Guide, available in the documentation
section of Siemens PLM Software’s support site. The Teamcenter Deployment
Guide also provides an in-depth review of Oracle database performance issues and
diagnosis, and configuration and tuning guidelines.
For Microsoft SQL Server configuration settings and tuning methods to optimize
Teamcenter performance, see the Teamcenter Deployment Guide, available in the
documentation section of Siemens PLM Software’s support site. The Teamcenter
Deployment Guide also provides an in-depth review of Microsoft SQL database
performance issues and diagnosis, and configuration and tuning guidelines.
Note Teamcenter servers and two-tier rich clients on Linux hosts cannot connect
to Microsoft SQL Server database servers.
Teamcenter clients
Rich client
The rich client is a platform-independent client implementation (Java application)
for users who interact with Teamcenter frequently. It is extendable and able to run
both Teamcenter and customer-written applications. Customers can also extend the
standard user interface.
The rich client application is deployed on each user workstation using Teamcenter
Environment Manager or the Over-the-Web Installer, depending on which
Teamcenter network architecture you use. The rich client is supported in both
architectural models described in Two-tier architecture and Four-tier architecture.
Thin client
The thin client provides access to Teamcenter through a standard commercial Web
browser, such as Microsoft Internet Explorer or Mozilla Firefox. The user interface
provides a streamlined browser-based view of product information stored in a
Teamcenter database.
The thin client is supported only in the four-tier architectural model described in
Four-tier architecture.
Basic tasks
File management
An initial install of Teamcenter using Teamcenter Environment Manager provides
a single FMS server cache (FSC) that mounts to a single volume; a typical
4. The error page displays all errors for that module. Error numbers are defined as
module base value + error code.
c. The Error Message Handler (EMH) Constants page displays the error base
of each module.
For example, the error base value of EMH_EMP_error_base is 33000.
Thus, the error number for the EPM_internal_error error is the concatenation
of the EPM modules error base (33000) and the error code (1), creating an
error code of 33001.
2 Process daemons
2 Process daemons
Dispatches events given a deferred execution time at the time specified, as well
as events intended for immediate dispatch that failed to execute immediately.
Information regarding events with a deferred execution time are stored in the
Teamcenter database as action objects. The action object contains the information
necessary to process the event, including event type, execution time, and the user
who generated the event.
This daemon also processes events requiring a workflow action handler to run a
defined subprocess. The handler is executed by either calling its associated handler
function (allowing the handler to run within the context of the daemon’s process)
or by initiating a separate subprocess. The method used is determined by how the
handler is configured in the database.
More than one action manager process daemon can be run at your site. Additional
daemons can be run on the same node, or on a different node. If you anticipate many
events, Siemens PLM Software recommends you run the daemons on server nodes
that users do not directly log on to improve performance.
Note Automatic logon is recommended for security reasons. Only a system
administrator can start this daemon.
At defined intervals, the daemon searches for action objects stored in the Teamcenter
database. It determines which of the objects are due for execution and processes a
defined number of these objects. To avoid memory leak problems, the daemon clones
and then terminates itself on a regular basis.
The duration of its sleep and wake cycles, the number of objects processed and its
cloning intervals are determined by the following preferences:
• TC_actionmgrd_sleep_minutes
Defines the number of minutes in the sleep period of the actionmgrd process
daemon between dispatching cycles.
• TC_actionmgrd_general_processing_hours
Allows you to define processing periods for the actionmgrd process daemon at
specified times during a 24-hour day. Use this preference as an alternative to the
TC_actionmgrd_sleep_minutes preference, which is based upon a continuous
sleep/dispatch cycle.
• TC_actionmgrd_max_actions_to_dispatch
Defines how many action events are dispatched every time the actionmgrd
process daemon processes actions events in the queue. Only the action events
determined to be ready for execution are processed.
• TC_actionmgrd_max_subprocess_to_start
Defines how many events the actionmgrd process daemon dispatches by
creating a separate subprocess run by a workflow action handler. Once the
defined number is exceeded, the daemon does not dispatch any event requiring
an action handler to execute as a separate subprocess.
• TC_actionmgrd_cloning_interval
Defines the number of cycles the actionmgrd process daemon completes before
cloning and terminating itself to avoid memory leak problems.
When running multiple actionmgrd process daemons, the operation of each daemon
can be independently controlled by using separate preference files in separate
TC_DATA directories.
Searches the Teamcenter database for subscriptions to the object for a given event
type. When a subscription event occurs (such as when an object is released) an
event object is created to capture that event and stored in a queue in the database.
Event types act as the catalyst for the subscripmgrd daemon, causing it to search
for subscriptions to the object for the given event type.
When matching subscriptions are found, the daemon determines if the action
handler associated with the subscription is executed immediately or if it has a
deferred execution time. For immediate events, the daemon calls the handler’s
associated function, thereby executing the handler in the context of the daemon’s
process. For deferred events, the daemon creates an action object for each deferred
subscription. Action objects are processed by the action manager daemon.
For more information, see Action Manager daemon.
If an error occurs when the daemon executes the subscription’s action handler, it
creates an action object, allowing the actionmgrd daemon to retry the handler.
If a subscription handler is defined in the database requiring a separate process,
the daemon creates an action object, deferring the execution to the actionmgrd
daemon, which will create a separate subprocess to execute the handler.
Note Automatic logon is recommended for security reasons. Only a system
administrator can start this daemon.
At defined intervals, the daemon searches for event objects stored in the Teamcenter
database. It dispatches each event by searching for subscriptions that match the
information in the even object. To avoid memory leak problems, the daemon clones
and then terminates itself on a regular basis.
The duration of its sleep and wake cycles, the number of subscriptions dispatched
and its cloning intervals are determined by the following preferences:
• TC_subscriptionmgrd_sleep_minutes
Defines the number of minutes in the sleep period of the subscripmgrd process
daemon between dispatching cycles.
• TC_subscriptionmgrd_processing_hours
Allows you to define processing periods for the subscripmgrd process daemon
at specified times during a 24-hour day. Use this preference as an alternative to
the TC_subscriptionmgrd_sleep_minutes preference, which is based upon a
continuous sleep/dispatch cycle.
• TC_subscriptionmgrd_max_subscriptions_to_dispatch
Defines how many subscriptions are dispatched every time the subscripmgrd
process daemon processes subscription objects.
• TC_subscriptionmgrd_cloning_interval
Defines the number of cycles the subscripmgrd process daemon completes
before cloning and terminating itself to avoid memory leak problems.
For more information about password management for utilities, see the Utilities
Reference. For more information about using encryption when changing the Oracle
password, see the server installation guides (Windows or UNIX/Linux).
4. From the list of services, select each service name that begins with
DB2–instance-name and click Start.
5. To verify that the DB2 Server service is running, check the Status column.
When the service is running, the status is Started.
Note Alternatively, you can start the DB2 server by browsing to the
DB2-home\sqllib\bin directory and double-clicking the db2start
program icon. (Replace DB2-home with the home directory of the DB2
installation.)
4. From the list of services, select each service name that begins with
DB2–instance-name and click Stop.
5. To verify that the DB2 Server service has stopped, check the Status column.
When the service not running, the status is blank.
Note Alternatively, you can stop the DB2 server by browsing to the
DB2-home\sqllib\bin directory and double-clicking the db2stop
program icon. (Replace DB2-home with the home directory of the DB2
installation.)
Alternatively, on Windows systems, you can open the DB2 Control Center by clicking
the Start button and choosing the following menu commands:
Programs→IBM DB2→instance-name→General Administration
Tools→Control Center
For information about using the DB2 Control Center, see the IBM DB2 Information
Center:
http://publib.boulder.ibm.com/infocenter/db2luw/v9/index.jsp
Replace db-name with the database name, db-user with the database user name,
and db-pw with the database user password.
• Make sure the database server is shut down before you begin this
procedure.
Check the db2ddl file for the source database name and replace the same
with target database name, if it is different from the source. The DDL script
is created in the current working directory.
b. Export the source database data by entering the following command from
your current working directory:
db2move source-db export -sn db-user
Replace source-db with the name of the source database. Replace db-user
with the database user name. For example:
db2move src_db export -sn infodba
Run this command from the directory in which you want the export files to
be stored. Depending on the size of the database, this process may take
significant time to complete. A 15–20 GB database can take more than 30
minutes to export.
c. Transfer export files to the host on which you want to import the database.
• To load the data on the target database without LOB data on Linux,
enter the following command from the directory of the load files:
db2move target-db load -lo insert
The system displays a list of tables that require the set integrity statement.
To make these tables usable, change the SET INTEGRITY value to
IMMEDIATE CHECKED or NORMAL by typing one of the following
commands:
db2 set integrity for table-name immediate checked
Before running Oracle database administration utilities, you must set the
ORACLE_HOME and ORACLE_SID environment variables. Oracle Corporation
recommends that you do not define Oracle environment variables in the system
environment scope. Rather, define them manually when you use Oracle utilities.
Defining Oracle environment variables at the system environment scope can cause
conflict when running multiple versions of Oracle on the same machine.
Note Do not set ORACLE_HOME on SUSE Linux platforms.
Environment
Variable Description
ORACLE_HOME This environment variable must be set before any of the
commands are started. ORACLE_HOME must be set to
the path of the top-level (root) directory containing the
Oracle application files.
Note Be consistent with the setting of
ORACLE_HOME for a database. Certain
database functions fail if this variable is set
incorrectly, even if it is set to a valid path to the
Oracle home directory (for example, a symbolic
link). ORACLE_HOME must always be set to
the same value as it was when the database was
created.
ORACLE_SID This environment variable is used to distinguish each
unique database instance and therefore must be set to
the database instance that you want to maintain or
administer.
To manually set the Oracle environment, enter one of the following sets of commands:
Windows systems:
set ORACLE_HOME=ORACLE_HOME
set ORACLE_SID=tceng
HP-UX:
export SHLIB_PATH=${SHLIB_PATH}:${ORACLE_HOME}/lib
Solaris:
export LD_LIBRARY_PATH=${LD_LIBRARY_PATH}:${ORACLE_HOME}/lib
Process Description
Oracle listener The Oracle listener (OracleTNSListener) service
monitors database connections from remote clients.
This is a SQL*Net V2/Net process and is required for
Teamcenter to connect. Under SQL*Net V2/Net, several
listeners may run on the same system, each listening for
connect requests to particular databases. Each listener
must be configured to listen on a different port. Even if
Teamcenter is run on the Oracle server, it is necessary
to start this service because all Teamcenter database
requests use the remote connect mechanism.
Process Description
Database instance There is one Oracle database service for an Oracle
database instance. It must be running for Teamcenter to
function properly. The service is:
OracleServiceSID
SID represents the database instance system identifier.
Use the Oracle SQL*Plus utility to stop a single database instance defined by the
ORACLE_SID environment variable.
4. Click Start.
6. Click Close.
• Manual startup
1. Log on to the operating system as a user with administrator privilege.
4. Click Start.
6. Click Close.
2. Manually set the Oracle environment by entering one of the following sets
of commands:
set ORACLE_HOME=D:\oracle\ora92
set ORACLE_SID=tceng
set PATH=%PATH%;%ORACLE_HOME%\bin
6. The Oracle database is initialized. Exit the Oracle SQL*Plus utility by entering
the following at the SQLPLUS prompt:
exit
4. Click Stop.
6. Click Close.
• Manual shutdown
1. Log on to the operating system as a user with administrator privilege. To
connect as internal (without a password), this account must be part of
ORA_DBA Windows local group.
4. Click Stop.
6. Click Close.
7. The Oracle database is shut down. Exit the SQL*Plus utility by entering the
following command at the SQLPLUS prompt:
exit
The Oracle listener service is configured to start automatically when the system is
restarted during the Oracle installation process:
1. Log on to the operating system as a user with administrator privilege.
3. Select the desired service, for example, OracleTNSListener for the Oracle
listener service or OracleServiceSID (SID is the instance system identifier, for
example tceng).
4. Verify the startup mode of the service is running by checking the Windows
Services dialog box for the following entry:
service-name status startup-mode
service-name is the name of the selected service, status is either Started if the
service is running or blank if it is inactive, and startup-mode is the current
startup mode.
5. If the startup mode is not Automatic, click Startup in the Services dialog box,
change the Startup Type to Automatic, and click OK.
6. Click Close.
Process Description
Oracle listener The Oracle listener (tnslsnr) process monitors database
connections from remote clients. This is a SQL*Net
V2/Net process and is required for Teamcenter to connect.
Under SQL*Net V2/Net, several listeners may run on
the same system, each listening for connect requests to
particular databases. Even if Teamcenter is run on the
Oracle server, it is necessary to start this process because
all Teamcenter database requests use the remote connect
mechanism.
Database instance Database processes are associated with a particular
Oracle database instance. There are six processes
associated with each database instance when it is first
started. The processes are:
• ora_pmon_SID
Process monitor; performs Oracle process recovery
when a user process fails.
• ora_dbw0_SID
Database writer process; writes dirty Oracle buffers
to disk.
• ora_ckpt_SID
Checkpoint process; updates the headers of all Oracle
data files to record the details of the checkpoint.
• ora_smon_SID
System monitor process; performs Oracle instance
recovery at instance startup.
• ora_reco_SID
Oracle recovery process; process used with distributed
database configuration that automatically resolves
failures involving distributed transactions.
• ora_lgwr_SID
Process Description
Log writer process; writes the Oracle redo log buffer
to a redo log file on disk.
All databases instances present on the system should be listed in the oratab
configuration file. This file is located in the /var/opt/oracle directory on Solaris
systems and in the /etc directory on all other platforms. Each instance should be
listed on a separate line and conform to the following format:
ORACLE_SID:ORACLE_HOME:FLAG
ORACLE_SID is the system identifier of the instance (for example, tceng),
ORACLE_HOME is the Oracle home directory associated with that instance (for
example, /u01/app/oracle/product/oracle-version), and FLAG is Y or N. These flags
are used by the Oracle dbstart and dbshut utilities to determine which instances to
start or stop.
Caution Never shut down a database instance by killing database processes or by
restarting the system. Oracle databases require orderly shutdowns to
ensure that all necessary database transactions are completed. Failure
to observe this may result in the corruption of the database. Manual
termination of processes also prevents the Oracle Relational Database
Management System (RDBMS) from releasing memory that is no longer
needed, and could require additional database recovery procedures at
the next database startup.
• Use the Oracle SQL*Plus utility to stop a single database instance defined by
the ORACLE_SID environment variable.
2. Manually set the Oracle environment by typing one of the following commands:
export ORACLE_HOME=/u01/app/oracle/product/oracle-version
export PATH=$PATH:$ORACLE_HOME/bin
Replace date and time with the operating system date and time that tnslsnr
was started.
2. Manually set the Oracle environment by typing one of the following commands:
export ORACLE_HOME=/u01/app/oracle/product/oracle-version
export PATH=$PATH:$ORACLE_HOME/bin
3. Start all Oracle database instances flagged in the oratab file by typing the
following command:
$ORACLE_HOME/bin/dbstart
4. Verify that the database processes are running by typing the following command:
ps -ef | grep ora
Replace date and time with the operating system date and time that the database
process was started. This example shows the background database processes
associated with an Oracle instance called tceng.
2. Manually set the Oracle environment by typing one of the following sets of
commands:
export ORACLE_HOME=/u01/app/oracle/product/oracle-version
export ORACLE_SID=tceng
3. Set the shared library path environment variable to include the Oracle lib
directory:
AIX:
export LIBPATH=${LIBPATH}:${ORACLE_HOME}/lib
HP-UX:
export SHLIB_PATH=${SHLIB_PATH}:${ORACLE_HOME}/lib
Solaris:
export LD_LIBRARY_PATH=${LD_LIBRARY_PATH}:${ORACLE_HOME}/lib
7. The Oracle database is initialized. Exit the Oracle SQL*Plus utility by entering
the following at the SQLPLUS prompt:
exit
2. Manually set the Oracle environment by typing one of the following commands:
export ORACLE_HOME=/u01/app/oracle/product/oracle-version
export PATH=$PATH:$ORACLE_HOME/bin
4. Verify that the tnslsnr process is no longer running by entering the following
command:
ps -ef | grep -v grep | grep tnslsnr
2. Manually set the Oracle environment by entering one of the following commands:
export ORACLE_HOME=/u01/app/oracle/product/oracle-version
export PATH=$PATH:$ORACLE_HOME/bin
2. Manually set the Oracle environment by typing one of the following commands:
export ORACLE_HOME=/u01/app/oracle/product/oracle-version
export ORACLE_SID=tceng
3. Set the shared library path environment variable to include the Oracle lib
directory:
AIX:
export LIBPATH=${LIBPATH}:${ORACLE_HOME}/lib
HP-UX:
export SHLIB_PATH=${SHLIB_PATH}:${ORACLE_HOME}/lib
Solaris:
export LD_LIBRARY_PATH=${LD_LIBRARY_PATH}:${ORACLE_HOME}/lib
8. The Oracle database is shut down. Exit the SQL*Plus utility by typing the
following command at the SQLPLUS prompt:
exit
• Create a new system rc script using sample scripts provided by Siemens PLM
Software.
In addition to the oracle.daemon script, a numbered symbolic link to this file must
be created in the default run control directory of SVR4 platforms:
AIX:
Edit the /etc/rc script by adding the following line to the local customization section
to run the oracle.daemon script.
/etc/oracle.daemon
HP-UX:
/sbin/rc2.d/S99oracle.daemon
Solaris:
/etc/rc2.d/S99oracle.daemon
• Create a new system rc script using sample scripts provided by Siemens PLM
Software
Because the sample scripts are highly platform-specific, sample shutdown scripts,
oracle.daemon, have been included. The following is a sample shutdown script
provided and the system directories where it must be located on each supported
platform:
HP-UX:
/sbin/init.d/oracle.daemon
Solaris:
/etc/init.d/oracle.daemon
In addition to the oracle.daemon script, a numbered symbolic link to this file must
be created in the default run control directory of SVR4 platforms:
HP-UX:
/sbin/rc2.d/K10oracle.daemon
Solaris:
/etc/rc0.d/K10oracle.daemon
Note There is no available procedure for automating shutdown of Oracle processes
on AIX systems.
Database management
Replace db-user with the Teamcenter database user name; replace password
with the database user password.
6. Issue any of the following commands to obtain desired information about your
database.
• To list a summary of the Teamcenter database files, type the following
command from the SQLPLUS prompt:
select * from sys.dba_data_files;
• To list available space in the tablespace in bytes, type the following command
from the SQLPLUS prompt:
select sum (bytes) from sys.dba_free_space where tablespace_name=’IDATA’;
• To list available space in the SYSTEM tablespace in bytes, type the following
command from the SQLPLUS prompt:
select sum (bytes) from sys.dba_free_space where tablespace_name =’SYSTEM’;
7. To exit the SQL*Plus utility, type the following command from the SQLPLUS
prompt:
exit
3. Set the shared library path environment variable to include the Oracle lib
directory:
AIX:
export LIBPATH=${LIBPATH}:${ORACLE_HOME}/lib
HP-UX:
export SHLIB_PATH=${SHLIB_PATH}:${ORACLE_HOME}/lib
Solaris:
export LD_LIBRARY_PATH=${LD_LIBRARY_PATH}:${ORACLE_HOME}/lib
Replace db-user with the Teamcenter database user name; replace password
with the database user password.
7. Issue any of the following commands to obtain desired information about your
database.
• To list available space in the tablespace in bytes, type the following command
from the SQLPLUS prompt:
select sum (bytes) from sys.dba_free_space where tablespace_name=’IDATA’;
• To list available space in the SYSTEM tablespace in bytes, type the following
command from the SQLPLUS prompt:
select sum (bytes) from sys.dba_free_space where tablespace_name =’SYSTEM’;
8. To exit the SQL*Plus utility, type the following command from the SQLPLUS
prompt:
exit
4. Select the service to be deleted (for example, OracleServiceTC) and click Finish.
All the database files and administrator files are deleted.
You may need to manually remove remaining files relating to this database
instance from the ORACLE_HOME\database directory. These files have
the instance identifier as parts of their names, for example, iniiman0.ora,
strtiman.cmd, imandb1.lst, imandb3.lst, and imandb3.sql.
For detailed information about allocating semaphores and rebuilding the UNIX
kernel, see the operating system documentation.
owned by oracle, these must be reallocated. If this is not done, semaphore resources
may not be sufficient to allow restarting the database.
Freeing semaphore sets is done by either using the ipcrm command or by restarting
the system. Normally, system administrators do not want to restart the system
only to free semaphore resources. Semaphore sets can be freed one at a time by
performing the following procedure:
Warning Do not attempt to reallocate semaphore resources from Oracle if the
Oracle server process (orasrv) is running. Corrupted data may result.
1. Log on as root.
Replace ID with the set identifying number from listed in step 46-2.
Error Cause
ORA-7251 spcre: semget error, could No semaphores are configured,
not allocate any semaphores or every semaphore is currently
allocated.
ORA-7252 spcre: semget error, could The first full set of semaphores was
not allocate semaphores successfully allocated, but additional
sets could not be allocated.
ORA-7279 spcre: semget error, unable The system is attempting to allocate
to get first semaphore set the first set of semaphores. The
system either does not have sufficient
semaphore resources or too many
semaphores or semaphore sets are
already allocated.
The corrective actions for all three of the preceding errors are the same:
Cause Action
One or both of these error codes is This is an effective (though ungraceful)
displayed as a result of the following way of letting the users know that the
scenario: after a shutdown abort, database has been shut down with the
one or more users ends a request abort option.
to the database and the request
process dies. This occurs because the
attempt to increment or decrement
the semaphore fails.
For export and import, only the character-set portion is important. For
language_territory, you can always use AMERICAN_AMERICA.
You must set the NLS_LANG environment variable explicitly.
Note If you do not explicitly set NLS_LANG, the system uses the default
value. On UNIX and Linux systems, the default NLS_LANG value is
AMERICAN_AMERICA.US7ASCII, which may cause export or import to
issue warnings or errors. On Windows systems, the default NLS_LANG is
obtained from the following Windows registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\ORACLE\HOMEid
id is 0, 1, 2, and so forth. The setting in the registry for the character set
reflects the character set you selected when you created the database using
Oracle DBCA.
When using Oracle export, set the character set on the NLS_LANG environment
variable to the same character set as the database you are exporting. No
conversion occurs, and the export file is created in the same character set as the
original database. If you plan to import the file into a database with a different
character set, you can postpone the conversion until the import.
To determine the character set of the current database, type the following
command in SQL*Plus:
select value from nls_database_parameters where parameter=’NLS_CHARACTERSET’;
o If the source database and target database use different character sets, leave
the character set part of NLS_LANG the same on both export and import.
Set it either to the same character set as the source database (preferred) or
to the same character set as the target database. Conversion occurs only
once, either on export or on import.
To determine the character set of the current database, type the following
command in SQL*Plus:
select value from nls_database_parameters where parameter=’NLS_CHARACTERSET’;
The default ASCII text file is named initSID.ora and is located in the following
directory:
Windows systems:
ORACLE_BASE/admin/ORACLE_SID/pfile
You can also start Oracle instances using a specified ASCII text file or server
parameter file, rather than the default file, or without specifying a file.
Oracle first searches for the spfileSID.ora file. If it does not exist, Oracle searches
for the spfile.ora file. If neither exists, Oracle uses the initSID.ora file. If none of
these files exist, Oracle displays messages similar to the following example:
SQL> startup
ORA-01078: failure in processing system parameters
LRM-00109: could not open parameter file ’D:\ORA101\DATABASE\INITORA101.ORA’
This option is not available if you are using a server parameter file. If you try to start
an Oracle instance using this option and specifying a server parameter file, Oracle
displays the following error message:
SQL> startup spfile=d:\ora101\database\spfileORA101.ora
SP2-0714: invalid combination of STARTUP options
If you start the database by specifying an ASCII text file, the spfile parameter
is displayed as empty:
SQL> show parameter spfile
NAME TYPE VALUE
--------------------------------- ----------- -----------
spfile string
To determine whether you used the server parameter file, enter the following
command in SQL*Plus:
test is the alias for this connect descriptor. Using the infodba user as an example,
the resulting connect string within Oracle would be:
infodba/infodba@test
The community defined in the above descriptor indicates the group of nodes to which
this system belongs. Communities are used by Oracle to indicate like groups of nodes
for use with the Multi-Protocol Interchange, which allows nodes on different types of
networks (for example, TCP/IP, SPX) to communicate.
Configuration files
Oracle Net may be configured via several files, but only two are mandatory files:
• The listener.ora file must reside on the Oracle server. It contains configuration
data for running the tnslsnr listener process (UNIX) and OracleTNSListener
Windows service (Windows) including a list of databases for which it should
listen for connection requests.
• The tnsnames.ora file must reside on an Oracle client. It contains the connect
descriptors and their aliases for the databases to which this client connects. This
file must also reside on an Oracle server.
On Windows, Siemens PLM Software also configures the sqlnet.ora file, which
must reside on the Oracle server and client and contains additional configuration
parameters.
There are other files that can be created but if they do not exist, Oracle assumes
defaults. Additionally, certain files only apply to products and functions which
Teamcenter is not likely to use. These files may reside in several locations.
The search path that Oracle uses to locate these files on UNIX is as follows:
HOME/.file-name.ora
TNS_ADMIN/file-name.ora
ORACLE_HOME/network/admin/file-name.ora
The search path that Oracle uses to locate these files on Windows is as follows:
file-name.ora in the current directory
TNS_ADMIN\file-name.ora
ORACLE_HOME\network\admin\file-name.ora
The Teamcenter data directory was chosen as the location for this file as it makes
the file immediately visible to all Teamcenter clients who want to use this database
and because this directory is guaranteed writable by the installer.
The tnsnames.ora file contains one entry—the entry for the database associated
with that Teamcenter data directory. This file is regenerated every time the data
directory is reconfigured.
The setting of TNS_ADMIN may be overridden from the external environment or
commented out in tc_profilevars, depending on the requirements of the site.
Caution If you maintain copies of the Oracle Net configuration files in various
locations in the system, be careful not to duplicate service aliases within
those files. Duplication of service aliases could lead to connection to the
wrong database and can result in lost or corrupted data. Ensure that
the TNS_ADMIN environment variable is set correctly before running
Teamcenter Integration for NX/NX Integration.
For lists of Microsoft SQL Server 2000 or 2005 configuration settings and tuning
methods that have the greatest impact on Teamcenter performance, see the
Teamcenter Deployment Guide, available in the documentation section of Siemens
PLM Software’s support site. The Teamcenter Deployment Guide also provides an
in-depth review of Microsoft SQL database performance issues and diagnosis, and
configuration and tuning guidelines.
5. To verify that the SQL Server service is running, check the Status column. When
the service is running, the status is Started.
5. To verify that the SQL Server service has stopped, check the Status column.
When the service not running, the status is blank.
Database security
SQL Server operates in one of two security (authentication) modes:
• Windows authentication mode
Windows authentication mode allows a user to connect through a Windows 2000
user account.
• Mixed mode
Mixed mode allows users to connect to an instance of SQL Server using either
Windows authentication or SQL Server authentication. Users who connect
through a Windows 2000 user account can use trusted connections in either
Windows authentication mode or mixed mode.
Siemens PLM Software recommends using mixed mode authentication, where
the user is required to input a database user logon ID and password to be able
to connect to the SQL Server.
Database deletion
If a Teamcenter database is corrupted beyond repair, the simplest solution may be to
delete all information from the database and start again.
To delete a database:
1. Start SQL Server Enterprise Manager and expand Microsoft SQL Servers→SQL
Server group→Local Server.
Error logs
You can view the SQL Server error log using SQL Server Enterprise Manager or
any text editor. The most current error log is named Errorlog (with no extension)
and is located in the Program Files\Microsoft SQL Server\MS SQL\Log
folder by default.
To view the SQL Server error log:
1. Expand a server group and then expand a server.
ODBC Communication
Teamcenter communicates with the SQL Server through the open database
connectivity (ODBC) connection. ODBC is an application programming interface
(API) that allows a programmer to abstract a program from a database. When
programming to interact with ODBC, you need only use the ODBC language (a
combination of ODBC API function calls and the SQL language). The ODBC
Manager determines how to connect with the type of database the user is targeting.
Regardless of the database type used, all calls are to the ODBC API. An ODBC
driver must be installed that is specific to the type of targeted database.
4 Teamcenter licenses
4 Teamcenter licenses
• Seat-level licensing
Specifies the base license level associated with each user, such as author,
consumer, and occasional user.
This association is mandatory for the users to log on to Teamcenter and use the
basic features of the Foundation template (core Teamcenter).
• License bundles
Includes specified Teamcenter features comprising a seat level and/or optional
modules. License bundles are then assigned to specific users. The user assigned
to the bundle is assured the availability of all the features in the bundle.
You can use license bundling in conjunction with other licensing schemes.
Consider a scenario when a user is assigned a license bundle that does not
include the Systems Engineering module. When the user launches Systems
Engineering, the system confirms if the feature key exists in the license file
outside of the license bundle. If the feature key is found, the application can
be used.
default, when creating new users, Teamcenter sets a license value that enables
authoring.
The list of license keys in your site’s license file determines which license
levels appear. Possible license levels are described in your license agreement
documentation. The license_level attribute on the POM_user class tracks license
levels.
Note During upgrade from Teamcenter 2007.1 MP2 or earlier, Teamcenter assigns
existing users the lowest available license level by default. After upgrade,
Teamcenter administrators must change users to other licensing levels
where appropriate.
Managing licenses
The list of license keys in your site’s license file determines which license
levels display. Possible license levels are described in your license agreement
documentation.
Make sure you do not exceed your allowed number of licenses. If necessary, you
can mark users as inactive using the -status argument in the make_user utility
(or through the Users pane within Organization) to reduce the number of licenses
being used.
To set an alert when available licenses are low, you can set the
license_warning_level preference to define the threshold of available Teamcenter
feature licenses. Teamcenter displays a warning message when you create
or modify a user if the number either equals or falls below the value in the
license_warning_level preference. The default value is 5.
In addition to the license_warning_level preference, you can set other preferences
to configure license management:
• LicenseUsage_admin_notifier_list
Specifies the identifiers of the administrative users who receive Teamcenter
notifications when the occasional user exceeds the allotted usage and/or grace
period limits specified for the occasional user license level.
• LicenseUsage_days_warning_level
Specifies the remaining duration in days in the allotted usage when occasional
logged-on users start receiving warning messages as a notification as they
approach their allotted usage days.
• LicenseUsage_hours_warning_level
Specifies the remaining duration in hours in the allotted usage when occasional
logged-on users start receiving warning messages as a notification as they
approach their allotted usage hours.
• LicenseUsage_module_usage_warning_level
Specifies the logins remaining in the month when administrators start receiving
warning messages that the module usage is approaching the allowed limit.
• LicenseUsage_show_userId_in_report
Activates the display of the actual user ID in the license usage report and the
module usage report.
• Siemens_PL_email_id
Specifies the valid e-mail ID of the Siemens PLM Software licensing account
team that receives notifications when any module usage limit exceeds its allowed
usage.
• Generate license usage reports from license logging information stored in the
Teamcenter database.
For more information, see Generating license usage and module usage reports.
License log files are stored in the syslog file. The raw license file includes time
stamp, license daemon, license checkin/checkout, feature key, and user ID. For
example:
6:02:45 (lmgrd) TIMESTAMP 5/20/2007
6:02:47 (ugslmd) OUT: "tol_cavity_milling" smeyer@svli6020
6:04:44 (ugslmd) IN: "tol_cavity_milling" smeyer@svli6020
6:04:51 (ugslmd) OUT: "tol_cavity_milling" smeyer@svli6020
6:11:09 (ugslmd) IN: "tol_cavity_milling" smeyer@svli6020
6:11:10 (ugslmd) OUT: "tol_cavity_milling" smeyer@svli6020
6:11:20 (ugslmd) IN: "tol_cavity_milling" smeyer@svli6020
12:02:45 (lmgrd) TIMESTAMP 5/20/2007
12:53:51 (ugslmd) OUT: "gateway" jdahlke@AHI6W022
12:54:02 (ugslmd) OUT: "ufunc_execute" jdahlke@AHI6W022
12:54:02 (ugslmd) IN: "ufunc_execute" jdahlke@AHI6W022
12:58:25 (ugslmd) OUT: "cam_base" jdahlke@AHI6W022
12:58:42 (ugslmd) OUT:
The license log file can be output as a text file or Microsoft Excel file. For example:
For more information about this utility, see the Utilities Reference.
• Supports simultaneous logons by the same user, such as when a single user is
logged on to both the rich client and the Teamcenter Client for Microsoft Office.
The system counts the usage from the first logon time for that named user until
the last logoff time. Time spent logged on to multiple clients simultaneously
is counted once, not multiple times.
You can generate reports of this information using the License Usage Report and
Module Usage Report from the Report Builder reports:
1. In the rich client, choose Tools®Reports®Report Builder Reports.
The Report Generation Wizard appears.
3. Click Next.
4. At the Fill in Criteria step, specify the desired criteria for the report.
6. Click Finish.
The report is generated and displayed in comma-separated format. The output
can be saved as a .csv file and opened in Microsoft Excel.
The output is similar to the FlexNet-based report. However, the pseudo IDs are
encrypted more securely, and the feature keys are grouped together on one line.
For example, following is output of the License Usage Report.
For example:
• -o
Specify the output file name. It must be a .csv file.
• (Optional) -pseudouser
Use this argument to output user names as pseudo user names. Use this
option to circumvent attributing individual usage to actual users, for
example, to protect the identity of individual user usage where required
by labor laws.
Administering proxy support for clients not integrated with TCCS . . . . . . . . . 5-12
The FCC accepts client requests over secure pipe connections and submits them
to the appropriate FMS server cache (FSC) process. It uses the TcProxyClient
component and forward proxy configuration to support forward and reverse
proxy servers.
Use the fccstat utility to administer and obtain run-time statistics from the FCC.
For more information, see Administering the FCC.
Note TCCS and all its container applications run simultaneously. Starting,
stopping, or reconfiguring TCCS (or any of its applications) propagates the
same action to all.
• fwdproxy_cfg.properties
For more information, see fwdproxy_cfg.properties file.
• reverseproxy_config.xml
For more information, see reverseproxy_config.xml file.
These files are stored in a separate location from the application. The default
location for these files is a platform-specific path.
• On Windows systems, the application first checks the
%USERPROFILE%\Siemens\cfg\tccs\%TCCS_CONFIG% path
for the files. If the files are not found, the application checks the
%ALLUSERSPROFILE%\Siemens\cfg\tccs\%TCCS_CONFIG path.
tccs.xml file
The tccs.xml file contains the following sections:
• List of applications configured with TCCS
This section contains the list of hosted TCCS components and the startup
information for each component.
o allowchunking
Allows the HTTP message body to be transmitted to the client as chunks
that are stamped with the size of the chunks.
The default value for the attribute is false. This value must be false for
WebSEAL proxy servers when you are using an IIS Web server because the
IIS Web server does not support chunking. This value must be false when
using a Squid proxy server because the Squid proxy server does not fully
support HTTP version 1.1, which is the version that supports chunking.
o allowuntrustedcertificates
Allows TCCS to accept server certificates that are not signed by a trusted
certificate authority.
o connectiontimeout
Sets the time period that a connection remains idle before it is closed.
o httpversion
Indicates the HTTP protocol version. The default is version 1.1.
Note HTTP version 1.1 supports chunking; version 1.0 does not.
o keystore
Sets the path to the Java keystore containing the user’s own certificate and
private key used for two-way SSL. The value is set into the Java system’s
javax.net.ssl.keyStore property.
o keystorepassword
Specifies the password for the Java keystore. The value is set into the Java
system’s javax.net.ssl.keyStorePassword property.
o maxconnectionsperhost
Sets the maximum number of connections to the proxy server from a single
host. The default value is 8.
o maxretriesreverseproxy
Set the maximum number of times an HTTP request is attempted when
receiving an authentication challenge from a reverse proxy server.
o sslEnabled
Sets whether secure sockets layer (SSL) is enabled. This attribute is optional
and appears only when the installer selects one of the following on the
Secure Socket Layer (SSL) Settings panel in Teamcenter Environment
Manager (TEM):
Disable SSL
Configure keystore
Note The application assumes that SSL is enabled regardless of
the sslEnabled tag in the XML file when the value of the
allowuntrustedcertificates setting is false, the keystore and
truststore paths are not specified, and SSL is not disabled.
o sockettimeout
Sets the maximum amount of time (in milliseconds) the HttpClient
component (the TCCS HTTP transport library) waits for data when executing
the method. A value of zero specifies an infinite time-out.
o stalechecking
Enables the HttpClient component (the TCCS HTTP transport library) to
determine if the active connection is stale before executing a request.
Typically, stale checking is disabled to improve performance.
o totalmaxconnections
Sets the maximum number of connections to the proxy server from all hosts.
o truststore
Specifies the path to the Java keystore containing the certificate authority
(CA) certificates trusted by the user. The value is set into the Java system’s
javax.net.ssl.trustStore property. If not specified, the Java default trust
store is used.
o truststorepassword
Specifies the password for the Java trust store. The value is set into the Java
system’s javax.net.ssl.trustStorePassword property.
o usesinglecookieheader
When submitting multiple HTTP cookies to a server, allows TCCS to place
all cookies in a single cookie header rather than using multiple cookie
headers. Set to true to allow submitting a single cookie header. This is
useful when working with HTTP servers that cannot process multiple cookie
headers correctly.
o kerberosconfig
Set enable to true to configure support for Kerberos authentication in
TCCS. The default value is false.
o alwayspromptforusername
Determines whether TCCS prompts users for their user name with Kerberos
authentication. Set to true for users to be prompted for their user name,
preventing zero sign-on functionality. Set to false for the user name to be
automatically obtained from the operating system logon, enabling zero
signon functionality.
The default value is false. This attribute is only valid when kerberosconfig
enable is set to true.
o krb5path value
Specifies the path to the Krb5 file used with Kerberos authentication. This
must be the absolute path to the Krb5 file including the file name. If no
value is provided, the Krb5 file is located in the default location as specified
in the Sun Java documentation:
http://docs.oracle.com/javase/6/docs/technotes/guides/security/jgss/tutorials/
KerberosReq.html
fwdproxy_cfg.properties file
The fwdproxy_cfg.properties file contains forward proxy related configuration
properties used by TCCS for server requests. All of these values are set in the
Teamcenter Environment Manager (TEM) TcCS Configuration Selection and
TcCS Settings panels. The file contains the following properties:
Note Whether your network uses IPv6 (128-bit) or IPv4 (32-bit) addresses, use
host names in URLs wherever possible so the domain name service (DNS)
can determine which IP address should be used.
If you must use IP addresses and your network uses IPv6 addresses, enclose
the literal IPv6 address in square brackets, for example:
http://[2001:db8:ffff:1:101:12ff:de13:1322]:9043/tc
• tcproxy.connection.type
Determines the type of connection for forward proxy servers. The default value
is direct, indicating there is no forward proxy server. Other valid values for
this property are:
o browser
Uses the Web browser proxy settings.
If you have more than one browser installed, your designated default
browser is used.
o network
Detects the proxy settings from the network the client is on.
o url
Retrieves the proxy autoconfiguration (PAC) file from the URL set in the
tcproxy.connection.url property.
o manual
Uses the proxy settings set in the manual configuration properties.
These are the properties prefixed with tcproxy.connection.manual
in this file. The manual configuration properties are ignored if the
tcproxy.connection.type attribute is not set to manual.
• tcproxy.connection.url
Sets the URL the TCCS application uses to retrieve the PAC file. This property
must have a value if the tcproxy.connection.type attribute is set to url.
• tcproxy.connection.manual.all.host
Sets the host name or IP address for the proxy server for all protocols.
If you set a value for this property, the following protocol host and port properties
are ignored:
o tcproxy.connection.manual.all.port
Sets the port number for the proxy server for all protocols.
o tcproxy.connection.manual.http.host
Sets the host name or IP address for the proxy server for the HTTP protocol.
If using manual configuration properties and a value for this property is not
provided, HTTP requests attempt to connect directly to the server host.
o tcproxy.connection.manual.http.port
Sets the port number for the proxy server for the HTTP protocol.
o tcproxy.connection.manual.https.host
Sets the host name or IP address for proxy server for the HTTPS protocol. If
using manual configuration properties and a value for this property is not
provided, HTTPS requests attempt to connect directly to the server host.
o tcproxy.connection.manual.https.port
Sets the port number for the proxy server for the HTTPS protocol.
o tcproxy.connection.manual.socks.host
Sets the host name or IP address for proxy server for the SOCKS protocol.
If using manual configuration properties and a value for this property is
not provided, the SOCKS protocol requests attempt to connect directly to
the server host.
o tcproxy.connection.manual.socks.port
Sets the port number for the proxy server for the SOCKS protocol.
o tcproxy.connection.manual.exceptions
o tcproxy.advanced.address_caching
Indicates whether resolved proxy addresses are cached based on their host
and port. Valid values are on and off (case-sensitive)
o tcproxy.advanced.retry_delay
Specifies the number of minutes to wait before retrying a connection to a
proxy server that failed a client connection. Valid values are any positive
integer.
Note To use WebRAID with a forward proxy, the forward proxy host and port
for the appropriate protocols (HTTP or HTTPS), must be specified in the
FMS_HOME\fcc.properties file as follows:
http.proxyHost=forward-proxy-host
http.proxyPort=forward-proxy-server-port
https.proxyHost=forward-proxy-host
https.proxyPort=forward-proxy-server-port
reverseproxy_config.xml file
The reverseproxy_config.xml file contains a list of criteria used for detecting a
form challenge from a reverse proxy server. The criteria list of values can be set
in TEM.
A criteria element requires one or more header elements and can contain zero
or one form element. Default criteria elements are provided for WebSEAL and
SiteMinder. You can edit these or add additional criteria elements, for example:
<criteria active=”true”>
<header name="server" value="Webseal"/>
<header name="challengeType" value="Form"/>
<form action="pkmsloginform"/>
</criteria>
<criteria>
<header name="server" value="SiteMinder"/>
<form action="smloginform"/>
</criteria>
• tcserver
The tcserver service endpoint is the URL of the Web tier deployment.
4. Specify the SSO information for the three environments using SSO.
5. In the Client Tag Filter panel, specify the filtering pattern you want to apply to
the environment list that displays to the user at logon.
To specify multiple filter tags, separate the entries with a pipe (|).
Example To display only the environments containing the SSO tag, type SSO
in the box.
To display the environments containing the SSO and Server2 tags,
type SSO|Server2 in the box.
Consider the following behavior when working with the TCCS container:
• TcProxyClient
The container initializes the TcProxyClient component that is the forward and
reverse proxy support library for TCCS.
• Restart
You must restart TCCS after making changes in TCCS configurations, such as
forward proxy, server end points, and HTTP parameters.
Note TCCS and all its container applications run simultaneously. Starting,
stopping, or reconfiguring TCCS (or any of its applications) propagates
the same action to all.
• totalmaxconnections
Sets the maximum number of connections through each proxy server to all hosts.
The default value is 10.
• connectiontimeout
Sets the time period that a connection remains idle before it is closed. The
default value is 30000.
• sockettimeout
Sets the maximum amount of time (in milliseconds) the HttpClient component
(the TCCS HTTP transport library) waits for data when executing the method.
The default value is 0, which specifies an infinite time-out.
• stalechecking
Enables the HttpClient component (the TCCS HTTP transport library) to
perform determine if the active connection is stale before executing a request.
The default value is false.
Typically, stale checking is disabled to improve performance.
• maxretriesreverseproxy
Set the maximum number of times an HTTP request is attempted when receiving
an authentication challenge from a reverse proxy server. The default value is 5.
• httpversion
Indicates the HTTP protocol version. The default value is version 1.1.
Note HTTP version 1.1 supports chunking, version 1.0 does not.
• Use the fccstat utility to administer and obtain run-time statistics from the FCC.
Consider the following behaviors when working with the FCC as it runs with TCCS:
• Setting the initialize parameter of the FMSClientCache element to true
in the tccs.xml file enables FCC functionality when TCCS starts. This is the
default value.
• The only tccs.xml file the FCC accesses is the one stored in the TCCS
configuration directory. Any other tccs.xml files are ignored.
• HTTP configuration parameters in the tccs.xml file are also applied to the FCC
connections to an FMS server cache (FSC).
Note TCCS and all its container applications run simultaneously. Starting,
stopping, or reconfiguring TCCS (or any of its applications) propagates the
same action to all.
Administering TcMEM
The Teamcenter model event manager (TcMEM) manages event synchronization
across SOA clients sharing the same Teamcenter server instance.
Use the tcmemstat utility to administer and obtain run-time statistics from
TcMEM.
Note TCCS and all its container applications run simultaneously. Starting,
stopping, or reconfiguring TCCS (or any of its applications) propagates the
same action to all.
Consider the following when administering proxy support for clients not integrated
with TCCS:
TCCS logging
You can examine TCCS log files to troubleshoot problems. TCCS log files are stored
in:
• Windows systems:
%USERPROFILE% /user-name/Siemens/logs/TCCS/process/
tccs_os-user-name_%TCCS_CONFIG_host-name.log
• UNIX systems:
$HOME\user-name\Siemens\logs\TCCS\process\
tccs_os-user-name_$TCCS_CONFIG_host-name.log
Users can change the log file location by setting the LOG_VOLUME_LOCATION
environment variable to a different location.
There are two logging configuration files, stored in the same location as the TCCS
startup script.
• log.properties
When TCCS starts, it looks for this file’s location in the classpath. The location
is specified by the LogVolumeLocation parameter, which points to the logs
value, which specifies the relative path to the TCCS startup script.
TCCS log files are output to the TCCS/process subdirectory within the logs
directory. Users can change the location that TCCS log files are stored by setting
• log4j.xml
This file contains an Appenders section and an MLD Loggers section. The
appenders are referenced by the logger definitions. Users can add additional
loggers to the file. The following must be specified for each logger entry:
o logger name
Specifies the name of the MLD logger.
o level value
Specifies the level of logging performed by the specified logger. See the
following table for default logging levels.
By default, all logging levels are set to warn.
o appender-ref
Specifies the appender to reference.
For example:
Users can define their own custom log4j configuration. This allows them to
supply their own configuration without affecting other users sharing the same
TCCS deployment environment. In this case, the LOG_CONFIG_LOCATION
environment variable must be set to specify the location of the custom log4j file.
6 Server manager
Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11
Introduction to monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11
Server manager monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-12
Server manager monitoring metrics . . . . . . . . . . . . . . . . . . . . . . . . . 6-12
Configure monitoring with the poolMonitorConfig.xml file . . . . . . . . . . 6-13
Sample poolMonitorConfig.xml code . . . . . . . . . . . . . . . . . . . . . . . . . 6-15
Configure monitoring with the server manager administrative
interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-17
Teamcenter server monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-19
Teamcenter server monitoring metrics . . . . . . . . . . . . . . . . . . . . . . . 6-19
Configure monitoring with the serverMonitorConfig.xml file . . . . . . . . 6-20
Sample serverMonitorConfig.xml code . . . . . . . . . . . . . . . . . . . . . . . . 6-22
Configure monitoring with the server manager administrative
interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-23
Monitoring system alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-25
Automatic metric collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-26
Automatic log level change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27
6 Server manager
• Monitor the Web tier for critical events using either the
webtierMonitorConfig.xml file or the Web tier administrative
interface.
For more information about using the XML file, see Configure monitoring with
the webtierMonitorConfig.xml file.
For more information about using the Web tier administrative interface, see
Start the administrative interface.
• Monitor the server manager for critical events, using either the
poolMonitorConfig.xml file or the J2EE server manager administrative
interface.
For more information about using the XML file, see Configure monitoring with
the poolMonitorConfig.xml file.
For more information about using the J2EE server manager administrative
interface, see Administering monitoring options for the server manager.
Alternatively, you can use a third-party application to manage all server manager
data.
For more information, see Using third-party applications to view server manager
administration data.
• Deploy the Teamcenter Web tier application (EAR file bundling a WAR file).
For more information, see the Web Application Deployment Guide.
If you install the J2EE based Server Manager or .NET based Server Manager
features, you must start the appropriate server manager to enable four-tier rich
clients to connect to the corporate server.
For information, see the Installation on UNIX and Linux Servers Guide or the
Installation on Windows Servers Guide.
• serverPooldatabase-name.properties
Used for pool-specific tuning of each individual machine. This is of particular
importance if each machine differs greatly in the number and power of its CPUs
from each other.
This file is stored in the TC_ROOT/pool_manager/ directory.
For more information, see Pool-specific configuration tuning recommendations.
• pref_export.xml
Used for configuring Web tier metrics and logging behavior.
This file is stored in the TC_ROOT/pool_manager/ directory.
For more information, see Web tier monitoring.
• Hard time-outs
Time-out parameters are available for the following server modes. The client
controls the mode of its assigned server at any given moment.
• Edit mode
The client may switch its server to this mode when it (or a user) is making
updates to server data that is not yet committed to the database. If the server is
lost, these changes are lost.
For example, Structure Manager uses edit mode to allow users to edit a BOM
structure through multiple operations that change temporary data in the server
and client until the user saves the data.
• Read mode
The client may switch its server to this mode when the client’s requests have set
a temporary state in the server to be used by subsequent requests. If the server
is lost, the client may require restart, and there may be performance issues as
the client becomes consistent with a new server, but no significant user work is
lost or corrupted.
For example, the rich client’s initial mode is read mode.
• Stateless mode
This is the default mode for a server. The client uses this mode when no requests
depend on the state that a previous request has made to the server. If the server
is lost, the next request can be executed on a new server without functional
issues except for the performance of assigning a new server.
For example, the Web client is stateless.
There is a time-out parameter for each combination of soft and hard time-outs
combined with each of the three modes. For example, the SOFT_TIMEOUT_EDIT
parameter applies to servers in edit mode when the server pool exceeds the value set
by the PROCESS_TARGET parameter.
There are two additional time-out parameters.
• USER_TIMEOUT_STATELESS
Configures the server idle time in seconds. This timeout applies after a user hits
the limit defined by the PROCESS_MAX_PER_USER value.
• QUERY_TIMEOUT
Configures the maximum time a server is allowed to process a single request. If
this time is exceeded the server is terminated. A value of 0 turns off the query
time-out, allowing a server to continue processing a request indefinitely.
• ASSIGNMENT_TIMEOUT
Timeout (in seconds) for a server assignment to be completed. This includes the
time for the server to authenticate the user credentials and perform user-specific
initialization.
file during insweb installation. To override the values, insweb can be rerun to
update these values in a new EAR. Alternately, a copy from the insweb staging area
can be placed in the J2EE application server startup directory.
CACHE_CONFIG_PATH=TreeCacheMcast.xml
PROCESS_MAX_PER_USER=0
QUERY_TIMEOUT=0
SOFT_TIMEOUT_EDIT=7200
SOFT_TIMEOUT_READ=3600
SOFT_TIMEOUT_STATELESS=1200
HARD_TIMEOUT_EDIT=28800
HARD_TIMEOUT_READ=28800
HARD_TIMEOUT_STATELESS=28800
USER_TIMEOUT_STATELESS=0
ASSIGNMENT_TIMEOUT=180
You may want to increase the values of some of the SOFT_TIMEOUT values to
reduce CPU overhead if these time-outs are common. The time-out configuration
values are in seconds. Also, though the edit soft time-out default is 7200 seconds
(two hours), the consequences are higher for such a time-out, and it may be desirable
to increase that value as well.
• PROCESS_CREATION_DELAY
Determines the interval of time (in milliseconds) between starting each
additional TcServer process to join the pool. (This parameter does not explicitly
appear in the file by default but can be added manually.)
• PROCESS_MAX
Sets the upper limit on number of running Teamcenter server processes.
• PROCESS_WARM
Sets the desired number of prestarted but unassigned Teamcenter servers.
A warm Teamcenter server is one that has been started and established its database
connection, and then is held in readiness for a user for logon. If there are no warm
Teamcenter servers, a new logon attempt displays a message that a server is not
available, and to try later.
• MAX_POOL_PROCESSING_INTERVAL
Determines the maximum time (in milliseconds) any given manager processing
thread sleeps before checking for additional work. The default setting is 600000
(10 minutes).
• MIN_POOL_PROCESSING_INTERVAL
Determines the minimum amount of time (in milliseconds) any given manager
processing thread sleeps before checking for additional work. The default setting
is 1000.
• PROCESS_READY_TIMEOUT
Determines the time (in seconds) the manager waits for a Teamcenter server
to report that it is ready before terminating the server process. The default
setting is 300.
• SERVER_HEARTBEAT_INTERVAL
Determines the time (in seconds) between license heartbeat calls sent from the
manager to each Teamcenter server. The default setting is 720.
• ENABLE_SERVER_HEARTBEAT
Determines whether server heartbeats are enabled. Server heartbeats are the
time (in seconds) between license heartbeat calls sent from the manager to each
Teamcenter server. The default setting is 0 (off). Enable heartbeats by setting
to any nonzero value.
• SERVER_RETRY_LIMIT
Determines the number of times the manager retries sending a message (for
example, a license heartbeat) to a Teamcenter server before giving up. The
default setting is 2.
• SERVER_RETRY_WAIT_PERIOD
Determines the delay (in milliseconds) between retry attempts when sending a
message to a Teamcenter server. The default setting is 1000.
• THREAD_POOL_INVOKING_SERVERS
Determines the maximum size of the pool of threads used for sending messages
to Teamcenter servers and performing other miscellaneous tasks in the manager.
The default setting is 500.
• ASSIGNMENT_RETRY_LIMIT
Determines the number of attempts to update TreeCache for a new server
assignment before returning an error. The default setting is 3.
• ASSIGNMENT_RETRY_WAIT_PERIOD
Determines the delay (in milliseconds) before retrying a TreeCache update for
a new server assignment. The default setting is 200.
• SERVER_HOST
Defines the host name (or IP address) on which the Teamcenter server listens
for CORBA connections. Store and forward is useful on machines with multiple
network interfaces. By default, this parameter is unset, causing the server to
select an arbitrary network interface from the available network interfaces.
• SERVER_PARAMETERS
Defines additional command line parameters supplied when starting a
Teamcenter server process. The default setting is -ORBNegotiateCodesets 0.
Setting PROCESS_CREATION_DELAY
It is critical that the rate of starting new Teamcenter servers not overwhelm the
processing resources available on the pool machine. Therefore, Siemens PLM
Software recommends the tuning process start by choosing an optimal setting for
PROCESS_CREATION_DELAY.
1. For your specific installation configuration and machine, measure the amount of
operating system processing resources consumed by a Teamcenter server to be
started and added to the warm pool. This can be done simply by looking at the
processing resources consumed by a server in a newly started up (but unused)
pool. This can be expressed as [warmCPUSec] in units of CPU seconds.
about 60000 milliseconds. The pool manager moves across the list based on
number of consecutive start failures.
Example:
[warmCPUSec] = 8 seconds
[warmFraction] = 0.6
[num_CPUs] = 2
[optimumDelay] = (8 * 1000) / (0.6 * 2) = 6667
PROCESS_CREATION_DELAY = 6667 7000 12000 24000 40000 60000
level. For example, if it is determined that there should be a minimum of 200 at time
1300, and the previous minimum was 100, and PROCESS_CREATION_DELAY
has been tuned to 5000 milliseconds, then it could take about (200 – 100) * 5000 =
500,000 milliseconds = 500 seconds = 8.3 minutes to ramp up the additional 100
processes. Thus the limit should be configured to 200 at around time 1250 to ensure
200 are all warm or in use at time 1300.
The number of Teamcenter servers added as warm per second after the delay
[warmCPUSec] is (1000 mSec/Sec) / PROCESS_CREATION_DELAY.
• If the burst interval is less than [warmCPUSec], a burst of logons greater than
PROCESS_WARM encounters an empty warm pool.
Typically, you do not need to perform this level of detailed analysis on pool logon
demands. Note that:
• Large PROCESS_CREATION_DELAY values should prompt you to configure
larger PROCESS_WARM pools.
Note Large PROCESS_CREATION_DELAY values should be configured for
low numbers of server CPUs or long values of [warmCPUSec]. If you
chose a low fraction of the machine to be used to start up new servers
to compute optimum PROCESS_CREATION_DELAY, you may want
to configure a larger PROCESS_WARM value to compensate for the
longer startup delays.
Monitoring
Introduction to monitoring
In a four-tier environment, you can monitor critical event data and (optionally)
receive notification when critical events exceed specified thresholds. This
information is useful for determining the cause of an issue, as well as allowing
you to take corrective action.
Different critical events can be monitored for the following elements of the
Teamcenter system.
• Web tier
Monitor Web tier server events such as abandoned servers, no servers available,
and so forth.
For information, see Web tier monitoring.
• Server manager
Monitor pool manager events such as login time, server crashes, and various
types of server time-outs.
For more information, see Server manager monitoring metrics.
• Teamcenter servers
Monitor server events on specific Teamcenter servers such as out of memory
errors, long running queries, and memory use.
For more information, see Teamcenter server monitoring metrics.
• Translation components
Monitor translation events such as dispatcher client events, dispatcher scheduler
events, and dispatcher module events.
For information about setting debug levels for the dispatcher services, see
Getting Started with Dispatcher (Translation Management).
You can configure monitoring behavior for each of these Teamcenter elements from
either a J2EE-based administrative interface or from XML configuration files.
Both configuration methods require you to first define the EmailResponder element
(specifying how and where e-mail notification is set) and the LoggerResponder
element (where critical event data is logged). You can then set values for the
different types of critical events of which you want to be notified.
Control the frequency of e-mail notifications and event logging by specifying
suppression periods.
Example You have configured the monitoring of business logic server crashes to
send e-mail notification when server crashes exceed 10 in 600 seconds.
At 10:00, you set suppression of this notification to 4 hours.
At 10:05, the notification threshold is met. E-mail notification is sent.
The suppression clock starts to count down.
The notification threshold is reached 22 times between 10:20 and 13:50.
Notification is suppressed each time.
At 14:00 the suppression clock reaches it 4-hour threshold. Another
notification threshold is met for business logic server crashes at 14:20.
E-mail notification is sent. Once again, the suppression clock starts.
Tip You should review all monitoring settings, ensuring the thresholds are set
correctly for your site.
If you do not know the optimum monitoring setting for any given critical
event, set the value to Collect. Collect the data and review to determine
normal activity levels. Then set threshold values slightly higher than
normal activity levels.
You can configure the following metrics to provide specified levels of monitoring
for specified threshold levels. Optionally, you can receive e-mail notification when
specified metrics cross specified thresholds.
Metric Description
Login Time The response time for users logging on through the
server manager to the server.
Edit Mode Timeouts The number of assigned servers in edit mode that
are timed out.
Read Mode Timeouts The number of assigned servers in read mode that
are timed out.
Stateless Mode Timeouts The number of assigned servers in stateless mode
that are timed out.
Query Timeouts The number of assigned servers performing queries
that are timed out.
Business Logic Server The number of each server crash in the server pool.
Crashes
Cold Servers The number of servers launched but not reporting
back in a specified amount of time.
Pool Capacity Timeouts The number of servers terminated by the server
manager before its configured amount of time, due
to insufficient capacity in the server pool.
Metric Description
Grave Events Fatal or unexpected errors occurring in the server
manager.
Log Level The duration and log level that is applied to the
target logger when triggered by an alert.
Metric Mode The list of target metrics that are collected when
triggered by automatic alerts.
Monitoring Notification The list of registered client listeners to notify when
a system alert occurs.
Tip The contents of the e-mail notifications are generated from the
TC_ROOT/pool_manager/poolMonitorConfigInfo.xml file. (This is a
companion file to the poolMonitorConfig.xml file.) For a complete list of
possible causes and recommended actions for server manager monitoring,
see this file.
• Disable_Alerts
Enables monitoring of all the metrics listed in the file, but disables all
notifications of critical events, regardless of individual notification settings
on any metric.
• Off
Disables monitoring of all the metrics listed in the file.
• EmailResponder id
Specify an identification for this e-mail responder. Multiple e-mail
responders can be configured, in which case, the identifiers must be unique.
• protocol
Specify the e-mail protocol by which notifications are sent. The only
supported protocol is SMTP.
• hostAddress
Specify the server host from which the e-mail notifications are sent. In a
large deployment (with multiple server managers, or the Web tier running on
different hosts) the host address identifies the location of the critical events.
• fromAddress
Specify the address from which the notification E-mails are sent.
• toAddress
Specify the address to which the notification E-mails are sent.
• suppressionPeriod
Specify the amount of time (in seconds ) to suppress e-mail notification of
critical events.
For more information, see the suppression period example in Introduction to
monitoring.
• emailFormat
Specify the format in which the e-mail is delivered. Valid values are html
and text.
• LoggerResponder id
Specify an identification for this logger responder. Multiple logger responders
can be configured, in which case, the identifiers must be unique.
• logFileName
Specify the name of the file to which critical events are logged.
• suppressionPeriod
Specify the amount of time (in seconds) to suppress logging of critical events
to the log file.
For more information, see the suppression period example in Introduction to
monitoring.
5. Configure the criteria for a critical event for any of the metrics in the file by:
a. Specifying a particular EmailResponder, if desired.
• Alert
Collect metric data, display results in the MBean view for this metric,
and send e-mail notifications when critical events occur.
• Off
No metric data is collected.
d. Setting the remaining values to specify criteria that must be met to initiate
a critical event for the metric.
</EmailResponder>
<EmailResponder id="EmailResponder2">
<protocol value="smtp"/>
<hostAddress value="svc1smtp.company.com"/>
<fromAddress value="tcsys@company.com" />
<toAddress value="admin2@company.com" />
<suppressionPeriod value="4200"/>
<emailFormat value="html"/>
</EmailResponder>
<LoggerResponder id="LoggerResponder1">
<logFileName value="ServerManagerMonitoring.log" />
<suppressionPeriod value="0"/>
</LoggerResponder>
</RespondersConfig>
<MetricsConfig>
<Metric name="Login Time" id="LoginTime" maxEntries="100" mode="Alert" metricType="double"
description="Average time taken for user to login during recent time period">
<ThresholdWithPeriod minEvents="3">
<ThresholdValue name="AverageTime" value="60"
description="Average time of the login request" />
<ThresholdPeriod name="TimePeriodInSec" value="600"
description="Periods for which login time will be monitored." />
</ThresholdWithPeriod>
<Responders>
<ResponderRef id="EmailResponder1"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
<Metric name="Edit Mode Timeouts" id="EditModeTimeouts" maxEntries="100" mode="Alert"
metricType="integer"
description="Edit mode timeouts may result in lost user data.">
<ThresholdWithPeriod>
<ThresholdValue name="NumberOfEditModeTimeOuts" value="10"
description="If number of timeouts exceeds this limit, notify the administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="600"
description="Periods for which timeouts will be monitored." />
</ThresholdWithPeriod>
<Responders>
<ResponderRef id="EmailResponder1"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
<Metric name="Read Mode Timeouts" id="ReadModeTimeouts" maxEntries="100" mode="Alert"
metricType="integer"
description="Read mode timeouts may force Rich Client users to restart client sessions.">
<ThresholdWithPeriod>
<ThresholdValue name="NumberOfReadModeTimeOuts" value="10"
description="If number of timeouts exceeds this limit, notify the administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="600"
description="Periods for which timeouts will be monitored." />
</ThresholdWithPeriod>
<Responders>
<ResponderRef id="EmailResponder1"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
<Metric name="Stateless Mode Timeouts" id="StatelessModeTimeouts" maxEntries="100"
mode="Alert" metricType="integer"
description="Stateless mode timeouts generally have low impact on users and are a good way
to control resource consumption in the server pool. However, an excessive rate might lead
to high CPU consumption due to continually starting new servers.">
<ThresholdWithPeriod>
<ThresholdValue name="NumberOfStatelessModeTimeOuts" value="10"
description="If number of timeouts exceeds this limit, notify the administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="600"
description="Periods for which timeouts will be monitored." />
</ThresholdWithPeriod>
<Responders>
<ResponderRef id="EmailResponder1"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
<Metric name="Query Timeouts" id="QueryTimeouts" maxEntries="100" mode="Collect"
metricType="integer"
description="A query time out indicates that a single server request has taken longer
than the configured timeout. ">
<ThresholdWithPeriod>
<ThresholdValue name="NumberOfQueryTimeOuts" value="10"
description="If number of timeouts exceeds this limit, notify the administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="600"
description="Periods for which timeouts will be monitored." />
</ThresholdWithPeriod>
<Responders>
<ResponderRef id="EmailResponder1"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
<Metric name="Business Logic Server Crashes" id="TcServerCrashes" maxEntries="100"
mode="Alert" metricType="integer"
description="Number of tcservers that have crashed for any reason.">
<ThresholdWithPeriod>
<ThresholdValue name="NumberOfCrashes" value="10"
description="If number of crashes exceeds this limit, notify the administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="600"
description="Periods for which timeouts will be monitored." />
</ThresholdWithPeriod>
<Responders>
<ResponderRef id="EmailResponder2"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
<Metric name="Cold Servers" id="ColdServers" maxEntries="100" mode="Alert"
metricType="integer"
description="A cold server is one that did not report back to the server manager within the
configured time period (Default: 5 mins) after being started.">
<ThresholdWithPeriod>
<ThresholdValue name="NumberOfColdServers" value="10"
description="If number of cold servers exceeds this limit, notify administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="600"
description="Periods for which cold servers will be monitored." />
</ThresholdWithPeriod>
<Responders>
<ResponderRef id="EmailResponder1"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
<Metric name="Pool Capacity Timeouts" id="PoolCapacityTimeouts" maxEntries="100"
mode="Collect" metricType="integer"
description="Servers are being terminated by the manager before their normal timeout period
due to insufficient capacity in the server pool.">
<ThresholdWithPeriod>
<ThresholdValue name="NumberOfPoolCapacityTimeouts" value="10"
description="If number of pool capacity timeouts exceeds this limit, notify the
administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="600"
description="Periods for which pool capacity timeouts will be monitored." />
</ThresholdWithPeriod>
<Responders>
<ResponderRef id="EmailResponder1"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
<Metric name="Grave Events" id="GraveEvents" maxEntries="100" mode="Alert"
description="Something has happened causing the server manager to malfunction.">
<Responders>
<ResponderRef id="EmailResponder2"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
</MetricsConfig>
</ApplicationConfig>
• Disable_Alerts
Enables monitoring of all the metrics listed in the file, but disables all
notifications of critical events, regardless of individual notification settings
on any metric.
• Off
• fromAddress
Specify the address from which the notification E-mails are sent.
• hostAddress
Specify the server host from which the e-mail notifications are sent. In a
large deployment (with multiple server managers, or the Web tier running on
different hosts) the host address identifies the location of the critical events.
• SuppressionPeriod
Specify the amount of time (in seconds) to suppress e-mail notification of
critical events.
For more information, see the suppression period example in Introduction to
monitoring.
• toAddress
Specify the address to which the notification E-mails are sent. You can
specify multiple e-mail addresses, separated by commas.
5. Click Apply.
• Log_filename
Specify the name of the file to which critical events are logged.
• Suppression_period
Specify the amount of time (in minutes) to suppress logging of critical events
to the log file.
For more information, see the suppression period example in Introduction to
monitoring.
9. Click Apply.
11. Configure monitoring of any of the server manager metrics listed under the
Administer Pool-name manager monitoring heading.
a. Click the desired metric.
For example: id=ColdServers.
b. Set the value for the Configure_mode attribute to one of the following:
• Collect
Collect metric data and display results in the MBean view for this metric.
This is the default setting.
• Alert
Collect metric data, display results in the MBean view for this metric,
and send e-mail notifications when critical events occur.
• Off
No metric data is collected.
d. Set the remaining values to specify criteria that must be met to initiate a
critical event for the metric.
Metric Description
POMRetries Number of POM retries
Deadlocks Number of deadlock
VeryLongRunningQueries Number of very long running queries
DBConnectionLosses Number of database connection losses
TimesDBOutOfSpace Number of times the database runs out of space
Metric Description
SqlTripCount Number of SQL trips
DetailedSqlStats Number of SQL statistics
SqlTotalTime Total SQL entries
OmAllocations Number of object manager (OM) allocations since
the last call
OmCurrentAllocated Number of total allocations for the current OM state
OsMemoryTotal Total memory space used by the operating system
OsMemoryPeak" Peak memory space used by the operating system
OsBsmUndoPool Size of the BSM undo pool from the operating
system
BsmUndoPoolInUse Size of the BSM undo pool in use
PomLocks Number of POM locks
OmModelData Total of Object Manager (OM) model data
OmRollbackData Total of Object Manager (OM) rollback data
Grave Events Fatal or unexpected errors occurring in the server
Tip The contents of the e-mail notifications are generated from the
TC_ROOT/pool_manager/serverMonitorConfigInfo.xml file. (This is a
companion file to the serverMonitorConfig.xml file.) For a complete list of
possible causes and recommended actions for Teamcenter server monitoring,
see this file.
• Disable_Alerts
Enables monitoring of all the metrics listed in the file, but disables all
notifications of critical events, regardless of individual notification settings
on any metric.
• Off
Disables monitoring of all the metrics listed in the file.
• EmailResponder id
Specify an identification for this e-mail responder. Multiple e-mail
responders can be configured, in which case, the identifiers must be unique.
• protocol
Specify the e-mail protocol by which notifications are sent. The only
supported protocol is SMTP.
• hostAddress
Specify the server host from which the e-mail notifications are sent. In a
large deployment (with multiple server managers, or the Web tier running on
different hosts) the host address identifies the location of the critical events.
• fromAddress
Specify the address from which the notification E-mails are sent.
• toAddress
Specify the address to which the notification E-mails are sent.
• suppressionPeriod
Specify the amount of time (in seconds) to suppress e-mail notification of
critical events.
For more information, see the suppression period example in Introduction to
monitoring.
• emailFormat
Specify the format in which the e-mail is delivered. Valid values are html
and text.
• LoggerResponder id
Specify an identification for this logger responder. Multiple logger responders
can be configured, in which case the identifiers must be unique.
• logFileName
Specify the name of the file to which critical events are logged.
• suppressionPeriod
Specify the amount of time (in seconds) to suppress logging of critical events
to the log file.
For more information, see the suppression period example in Introduction to
monitoring.
5. Configure the criteria for a critical event for any of the metrics in the file by:
a. Specifying a particular EmailResponder, if desired.
• Alert
Collect metric data, display results in the MBean view for this metric,
and send e-mail notifications when critical events occur.
• Off
No metric data is collected.
d. Setting the remaining values to specify criteria that must be met to initiate
a critical event for the metric.
• Disable_Alerts
Enables monitoring of all the metrics listed in the file, but disables all
notifications of critical events, regardless of individual notification settings
on any metric.
• Off
Disables monitoring of all the metrics listed in the file.
• fromAddress
Specify the address from which the notification E-mails are sent.
• hostAddress
Specify the server host from which the e-mail notifications are sent. In a
large deployment (with multiple server managers, or the Web tier running on
different hosts) the host address identifies the location of the critical events.
• suppressionPeriod
Specify the amount of time (in seconds) to suppress e-mail notification of
critical events.
For more information, see the suppression period example in Introduction to
monitoring.
• toAddress
Specify the address to which the notification E-mails are sent. You can
specify multiple e-mail addresses, separated by commas.
5. Click Apply.
• Log_filename
Specify the name of the file to which critical events are logged.
• Suppression_period
Specify the amount of time (in seconds) to suppress logging of critical events
to the log file.
For more information, see the suppression period example in Introduction to
monitoring.
9. Click Apply.
11. Configure monitoring of any of the Teamcenter server metrics listed under the
Administer Pool-name servers monitoring heading.
a. Click the desired metric.
For example: type=Configuration,id=Deadlocks.
b. Set the value for the Configure_mode attribute to one of the following:
• Collect
Collect metric data and display results in the MBean view for this metric.
This is the default setting.
• Alert
Collect metric data, display results in the MBean view for this metric,
and send e-mail notifications when critical events occur.
• Off
No metric data is collected.
d. Set the remaining values to specify criteria that must be met to initiate a
critical event for the metric.
• Sequence number
An incremental integer used to order notifications.
• A string that indicates the monitoring component that raised the alert in a
Java component format, for example”
com.teamcenter.mld.healthmonitoring.ServerManager.threshold
• Message
A summary of the alert from the originating metric, for example:
Teamcenter Alert: Business Logic Server Crashes exceeded threshold.
• User data
A string containing the MetricID value.
The client can requested the following additional information about the alert:
• AlertSummary data. This is information specific to the alert raised.
If the mode for a metric is already set to Collect or Alert, subsequent alerts are
ignored.
2. ERROR
3. WARN
4. INFO
5. DEBUG
6. TRACE
If you specify a log level for a logger that has been adjusted due to an alert on a
metric, your value supersedes the responder setting and clears any log level changes
in queue due to the alert. The following is a sample configuration for automatic log
level change to Debug for the LogLeverController1 responder with a duration of
1000 seconds:
<LogLevelController id="LogLevelController1">
<targetedLevel value="Debug"/>
<duration value ="1000"/>
<targetedLoggers>
<loggerName value="Teamcenter.pom"/>
<loggerName value="Teamcenter.bom"/>
</targetedLoggers>
</LogLevelController>
For information about working with server manager logging levels, see Dynamically
changing logging levels of business logic servers.
In the J2EE server manager administrative interface, the list of loggers is displayed
under the log4j heading in the Agent View.
2. Within each logger MBean, change the logging level by entering any valid
logging level in the priority box, for example, DEBUG.
3. Click Apply.
The logging level for the selected logged is changed for the server manager until
the server manager is restarted.
2. Scroll down to the List of MBean operations section and click Show_Servers to
display a list of all servers in the pool.
The list of servers includes each server’s name, PID, status, and the user
assigned to the server.
3. Click the Teamcenter server for which you want to configure logging.
The resulting view lists the server’s logging and monitoring attributes.
4. Scroll down to the Server Log Configuration row and click the
ServerLogConfiguration:server=server-name@pool-name value.
The resulting view lists the server’s logging and journaling attributes and
operations.
Note The first time you access this view, the selected Teamcenter server is
added to the ServerLogConfiguration heading in the Agent View.
Note The first time you access this view, the selected Teamcenter server is
added to the LoggingLevels heading in the Agent View.
6. Scroll down to the List of MBean operations section and click Refresh_Loggers
to display all loggers for the Teamcenter server in the List of MBean Attributes
table.
8. (Optional) Initialize logging for an existing logger that does not display in the
logging table.
c. Click Initialize_Logger.
The new logging level is implemented for this logger. The list of all loggers
for the Teamcenter server is refreshed in the List of MBean Attributes table.
9. (Optional) Perform any of the logging operations within the List of MBean
Operations list to configure logging and journaling behavior.
For more information about configuring SQL logging, see Changing SQL logging
behavior.
To view changes to logging levels, click the Teamcenter server name under the
LoggingLevels heading in the Agent View.
Change the logging status using the SQL parameters. By default, the SQL Logging
parameters display as True, as the following graphic illustrates.
Selecting True or False for any or all of the SQL logging parameters and clicking
Change_SQL_Logging updates the SQL logging settings on the server.
The status changes in the attributes table and the parameters are all reset to True.
3. In this view, perform any of the journaling operations within the List of MBean
Operations table to configure journaling behavior.
4. Click ModuleJournaling:name=server-name@pool-name@machine-name.
Note The first time you access this view, the selected Teamcenter server is
added to the ModuleJournaling heading in the Agent View.
5. In this view, click Refresh Modules to display all journal modules for the
Teamcenter server in the List of MBean Attributes table.
By default, journaling for each module is off. Enable journaling for any module
by setting the module’s value to True.
Alternatively, enable journaling for all modules by clicking Activate_All_Modules.
Disable journaling for all modules by clicking Deactivate_All_Modules.
For subsequent changes to journaling behavior, you can click the Teamcenter server
name under the ModuleJournaling heading in the Agent View.
• Deploy the Teamcenter Web tier application (EAR file bundling a WAR
file).
For more information, see the Web Application Deployment Guide.
After installing and configuring the server manager, use the HTML-based server
manager interface to manage the server manager tasks as shown.
2. To log on, use the default user ID (manager) and password (manager). You
can change these values using the Change_Authentication operation on the
Pool Manager page.
The server manager displays the Agent View page.
Global_Pool_Configuration
Host
Last Restart Warm Servers Time
Number of Assigned Servers
Number of Cold Servers
Number of Servers
Number of Warm Servers
Number of Warming Up Servers
Pool ID
Pool-Specific_Configuration
Server Pool Manager Loggers
Servers in Edit Mode
Servers in Read Mode
Servers in Stateless Mode
TreeCache_Configuration
Clicking any operation name displays the help for that operation. You can perform
the following operations for any pool.
Operation Behavior
Show_Servers Displays a list of all servers in the pool.
Shutdown_Manager Shuts down the server manager.
Show_Servers_Assigned_to_User Displays a list of all servers assigned to
the specified user.
Change_Global_Pool_Configuration Changes a global pool configuration
parameter dynamically. For example,
use this operation to change a time out
value.
Change_Pool-Specific_Configuration Changes a pool-specific configuration
parameter dynamically. For example,
use this operation to change the
PROCESS_TARGET.
Restart_Warm_Servers Recycles warm servers in all server
manager pools without shutting down
the server manager. This is useful for
updating cached values on a warm
server.
For more information, see Restarting
warm servers.
Shutdown_Server Shuts down the specified server.
Show_Pools Displays a list of remote pools.
Operation Behavior
Clean_Up_Pool Cleans up data in the tree cache relating
to the specified server pool.
Change_Authentication Changes the user name and password
for the server manager administration
interface.
Show_TreeCache Displays the complete contents of the
tree cache.
To be notified when criteria reaches the specified threshold for any of the available
metrics, set the EmailRepsonder1 element and LoggerResponder1 element at this
level first, and then place the same values for the corresponding EmailRepsonder1
and LoggerRepsonder1 elements within the desired metrics.
For more information about the specific steps required for configuring monitoring,
see Configure monitoring with the server manager administrative interface.
Health Monitoring
Last message number
Last message time
Primary Address Host
Primary Address Port
Process ID
Ready
Server ID
Server Log Configuration
State
Clicking any operation name displays the help for that operation. You can perform
the following operations for any server.
To be notified when criteria reaches the specified threshold for any of the available
metrics, set the EmailRepsonder1 element and LoggerResponder1 element at this
level first, and then place the same values for the corresponding EmailRepsonder1
and LoggerRepsonder1 elements within the desired metrics.
For more information about the specific steps required for configuring monitoring,
see Configure monitoring with the server manager administrative interface.
Clicking any operation name displays the help for that operation. You can perform
the following operations for any server.
ImplementationName
ImplementationVendor
ImplementationVersion
MBeanServerId
SpecificationName
SpecificationVendor
SpecificationVersion
Clicking any operation name displays the help for that operation. You can perform
the following operations for any server.
For more information about the procedure, see Configure business logic server
manager logging in the J2EE server manager administrative interface and
Configuring Teamcenter server journaling.
• The Web tier confirms that the host supplied as the primary IP address in IORs
for Teamcenter servers can be reached from the Web tier.
2. To log on, use your operating system administrative user name and password.
Use the Global Configuration view to set global pool parameters, view available
server manager instances, and perform global pool operations.
Note The .NET architecture provides less functionality than the J2EE
architecture. To manage monitoring and logging metrics, use the J2EE
architecture.
You can set parameters for the following global pool configuration elements:
Soft Timeout Stateless
Soft Timeout Read
Soft Timeout Edit
Query Timeout
Hard Timeout Stateless
Hard Timeout Read
Hard Timeout Edit
Process Ready Timeout
The table following the Server Manager Instances heading displays all available
server managers.
You can sort the table contents by clicking either the Server Manager ID or State
column titles.
Click the Restart Warm Servers button to recycle warm servers in all server
manager pools without shutting down the server manager. This is useful for
updating cached values on a warm server.
If you use this functionality to restart most (or all) the warm servers at your site,
this task should be performed with very few users on the system. Otherwise, there is
a risk that no warm servers are available during the short time it takes to recycle
the servers.
Example The server manager is configured to support 100 users during 08:00 to
17:00. At 07:55, there are no users on the system; therefore, there are
100 warm servers available. Choosing to recycle all 100 servers at 07:55,
in order to refresh cached server values, may not allow sufficient time for
the servers to restart by 08:00. Any users attempting to log on before the
servers have restarted receive a message that no server is available.
Displays the ID of the server manager in port@host, specifying the host and port
on which the server manager is running.
• Available Servers
Displays the number of business logic servers in Ready mode and available
for assignment to users. If this number reaches zero, a business logic server
cannot be assigned to new users on this server manager. Users already logged
on receive continued access.
• Busy Level
Displays the percentage of business logic servers in use relative to the maximum
number of servers assigned to the server manager. If there are multiple server
managers, load balancing across the server managers ensures each server
manager is at approximately the same level.
• Active Status
Displays whether the server manager is active or inactive.
You can click the Activate link to make the server manager inactive.
• Deploy the Teamcenter Web tier application (EAR file bundling a WAR
file).
For more information, see the Web Application Deployment Guide.
After installing and configuring the server manager, use the .NET-based server
manager interface to manage the global server pool and individual servers.
The .NET architecture provides less functionality than the J2EE architecture. To
manage monitoring and logging metrics, use the J2EE architecture.
Global configuration
Teamcenter server
http://download.oracle.com/javase/6/docs/technotes/guides/management/jconsole.html
• Java VisualVM
A monitoring tool that provides a visual interface for viewing detailed
information about Java applications while they are running on a Java Virtual
Machine (JVM), and for troubleshooting and profiling these applications. Various
stand-alone tools, such as JConsole, jstat, jinfo, jstack, and jmap, are part of
Java VisualVM.
This tool is included in the Java development kit (JDK).
http://download.oracle.com/javase/6/docs/technotes/guides/visualvm/index.html
• HP Operations Manager
A comprehensive management solution that monitors, controls, automates
corrective actions and reports on the health of all parts of the managed IT
infrastructure.
http://h71000.www7.hp.com/openvms/products/openvms_ovo_agent/
• Provide new values for the properties to be updated on the found objects.
For more information about performing this step, see Using command line
arguments to update property values in bulk for simple updates and Using an
XML input file to update property values in bulk for complex updates.
The scope of your bulk updates can range from changing a few values on a few
properties (simple) to changing many values on all properties throughout the
database (complex). The scope of your planned update determines which format to
use to provide query criteria and replacement values to the attribute_export utility.
• Simple updates
Use this method when updating a few values on a small number of properties
for a few object types.
Example The designers at Manufacturing, Inc. create two new colors for
their spinning widgets and discontinued another color. Accordingly,
their Teamcenter administrator must add the slide_green
and twisting_turquoise values to the color property on the
widget_spin object and remove the boring_brown value.
Specify the condition property name/property value pairs and update property
name/property value pairs for the utility. Optionally, you can also specify an
operator for condition property name/property value pairs.
-cond_prop
-cond_value
-update_prop
-update_value
-cond_operator
For more information, see Using command line arguments to update property
values in bulk.
• Complex updates
Use this method when changes to your business practices require sweeping
changes to existing property values throughout the database.
Example At Acme Company, every workspace object includes Division as a
required property. Valid Division values are the different business
divisions of Acme. A reorganization changes the list of existing
business divisions significantly and creates new subsectors. Acme’s
Teamcenter administrator must update the Division values on
every workspace object in the database.
Create an XML input file to specify property name/property value pairs to query
for the objects to be updated, and then specify property name/property value
pairs to update the found objects.
For more information, see Using an XML input file to update property values
in bulk.
• Provide new values for the properties to be updated on the found objects.
• Query arguments
These arguments are the equivalent of the WHERE clause in an SQL phrase.
They identify the property type, property names, and property values to be
queried.
-type
-cond_prop
-cond_value
-cond_operator (optional)
The two condition property name/property value arguments must always be used
in conjunction with the update property name/property value arguments.
o The -type argument specifies the object type to be updated, such as item,
dataset, or StructureContext.
This argument accepts only a single value. You can use multiple instances of
this argument to specify multiple object types. Each instance must be paired
with the -cond_prop and -cond_value arguments.
• Update arguments
These arguments are the equivalent of the UPDATE clause in an SQL phrase.
They identify the property names and values to be updated.
-update_prop
-update_value
o The -update_value argument specifies the new value for the property
specified by the -update_prop argument.
This argument accepts multiple values in a comma-separate list. For
example:
-update_value=folder,”Home folder”
You can use multiple instances of this argument. Pair each instance of this
argument with the -update_prop argument.
The following examples illustrate the use of the condition property name/property
value pairs and update property name/property value pairs with the
attribute_export utility:
• To update prop3 to value3 and prop4 to value4 for type1 objects, when prop1
equals value1 and prop2 is greater than value2 in batches of 400, enter the
following command on a single line:
-cond_prop=object_name -cond_value="TextData_es_ES"
-cond_prop=”last_mod_date” -cond_value=”01-DEC-2011 00:00”
-cond_operator=”GE”
• Provide new values for the properties to be updated on the found objects.
Structure the file as a series of UpdateSets entries. Each update set must contain
type, condition, and update components. The following sample XML file illustrates
the required sequence of the XML components, first type, then where, and then
update.
Note There is no required sequence within the cond_prop component for the
attrName, attrValue, and cond_operator components.
• Type component
This component specifies the object type to be updated, such as item, dataset,
or StructureContext.
• Condition components
These components are placed in the <where> section of the update set. They
identify the property names and values to be queried.
cond_prop
cond_value
cond_operator (optional)
• Update components
update_prop
update_value
o The update_value component specifies the new value for the property
specified by the update_prop component.
This argument accepts multiple values in a comma-separate list. For
example:
update_value=folder,”Home folder”
You can use multiple instances of this component. Each instance of this
component should be paired with the update_prop component.
• Array properties
o Fixed length array
Performance statistics
You can estimate the duration of your bulk update based on the following
performance statistics, based on custom ADSPart objects.
o Memory: 2 GB
• To determine all the current values of attributes you plan to update, use the
-untransformed switch with either the -inputfile argument containing only
condition property/value entries (no update entries) or the -cond_prop and
-cond_value arguments.
• To confirm the updates were made as expected, specify an output directory with
the -outdir argument so that you can review the output log.
o Duration
To estimate the duration of various update operations, see the performance
tables. If the estimated time is considerable, there are three methods for
managing the operation duration.
For more information, see Performance statistics.
◊ Second update
-cond_prop=”last_mod_date” -cond_value=”01-DEC-2011 00:00”
-cond_operator=”LE”
-cond_prop=”last_mod_date” -cond_value=”01-DEC-2010 00:00”
-cond_operator=”GE”
◊ Third update
-cond_prop=”last_mod_date” -cond_value=”01-DEC-2011 00:00”
-cond_operator=”GT”
• Multisite support
FMS enables file transfer directly between servers in two different PLM systems,
eliminating the need for an intermediate transfer directory.
• Pull-through caching
FMS automatically caches data at the locations needed, based on what data
users read and write to the system.
• Managed caches
The FMS client and server caches are self-purging. The least recently accessed
data is purged first.
FMS components
FMS server cache
The FMS server cache (FSC) is the name of the FMS server cache server process.
The FSC is a shared, secure, server level cache. It uploads and downloads files to
other FSCs and to FCCs.
An FSC can provide one or more modes of behavior, where each mode manages a
type of data including volume files, cache files, transient files, and configuration
files. A particular FSC can perform any or all of these functions simultaneously
depending on your FMS configuration. All FSCs provide at least one mode in a
properly configured FSC topology.
You define configuration, volume and transient file modes explicitly in the FMS
configuration files using XML statements. Cache server functionality is installed on
each FSC, but is only used if the FSC does not have direct access to volume files.
The various FSC modes are as follows:
• Configuration server (optional)
One or more FSCs may be designated as a configuration server. An FSC
configuration server reads the fmsmaster.xml configuration file and distributes
that information to other FSCs and/or clients. The FSC configuration topology
can be a single FSC or a tree of FSCs. The FSC configuration topology is separate
from the FSC routing topology.
• Server configuration
The FSC reads and distributes FMS configuration data across site FSCs and
FCC processes.
• Client configuration
The FSC processes the client configuration, analyses the configuration, computes
the configuration download for each client, and provides this information as a
bootstrap download when the FCC process initializes.
The FCC caches downloaded whole files in a whole file read cache. Most
applications access a whole file at a time, including Teamcenter rich client,
Microsoft Office products, 2D viewers, and others.
• Managed cache
The FCC automatically purges old cache data based on configuration parameters.
Separate sizing parameters are provided for each cache type including whole file
read, whole file write and segment file read.
• Client configuration
The FCC reads a local fcc.xml configuration file and uses this information to
bootstrap a server based configuration download. This provides the capability
to centrally manage FCC configuration parameters with a minimum amount of
configuration data installed on the client.
Grammatical elements provided within the FMS configuration files syntax are as
follows:
• Substitution elements
Use substitution elements such as $HOME within string values to simplify
parameter specifications within the configuration file.
• Directory paths
Directory paths may use either local computer conventions with forward or
reverse slashes, or UNC style conventions such as //server1/share/volume1.
• fmsworld
This element is the outer containing XML element.
• fmsenterprise
Contains the primary configuration content including the FMS topology and
the FSC and FCC parameter defaults.
• fscdefaults
Contains the parameter defaults for all the site FSCs, and indicates which of
these parameters can be overridden by a particular FSC installation.
• fccdefaults
Contains the parameter defaults for all the site FSCs, and indicates which of
these parameters can be overridden by a particular FCC installation.
• fscGroup
Contains a list of all the FSCs installed as part of a LAN configuration. One or
more groups can be defined. FSCs within a defined group cannot be deployed
across a WAN. FMS assumes that file transfers between two FSCs within an
FSC group are directly routed with no WAN acceleration.
• volume (optional)
Describes where the FSC mounts volumes. An FSC may mount one or more
volumes.
• transientvolume (optional)
Specifies the temporary directory used by Teamcenter business servers for
writing and reading temporary files in four-tier configurations. Users access
these files using the Teamcenter rich and thin clients.
Note Do not use the following symbols as delimiter characters within an
fmsenterprise ID, fscGroup ID, or fsc ID:
• Slash (/)
• fscconfig
This element is the outer containing XML element.
• fscdefaults (deprecated)
Defines or overrides FSC default values from the master configuration file
(fmsmaster.xml).
Note Placing this element in the FSC is deprecated. Siemens PLM Software
recommends placing this element in the master configuration file,
exposing the element to all FSCs generating configurations from the
master configuration file that owns the FSC file.
• fccdefaults (deprecated)
Defines or overrides FCC default values from the master configuration file
(fmsmaster.xml).
Note Placing this element in the FSC is deprecated. Siemens PLM Software
recommends placing this element in the master configuration file,
exposing the element to all FSCs generating configurations from the
master configuration file that owns the FSC file.
• fmsmaster
• fsc
Specifies the identity of the installed FSC. This identity must match an FSC
defined in the master configuration file and be within an FSC group.
WebRAID downloaders are more difficult to create and maintain than traditional
LAN downloaders. You can use a cache of WebRAID downloaders to help reduce
the number of instances that must be created. The following table lists the values
available for WebRAID instance cache parameters.
Name Default value Description
FSC_MaximumIdleWebRaid 20 Defines the maximum number of idle
Downloaders downloaders. An idle downloader is
a downloader not currently in use
that can be used on a new, incoming
request.
FSC_MaximumWebRaid 30 Defines the maximum number of
Downloaders WebRAID downloaders.
FSC_MaximumIdleWebRaid 15000 Defines the lifetime of an idle WebRAID
DownloaderAgeMs downloader. Idle downloaders that
exceed the specified timeout limit are
disposed of.
• fccconfig
This element is the outer containing XML element.
• fccdefault (optional)
Defines or overrides FCC default parameters downloaded from the parent FSC,
if these parameters may be overridden.
• parentfsc
Specifies which FSC to download the FMS configuration information from. You
may specify multiple parent FSCs to provide failover.
The following table lists the values available for FCC whole file cache parameters.
Defined how often, in minutes, the FCC checks the size of the
cache for its maximum size (high water mark) and, when
reached, may purge files.
FCC_WholeFileCache 30 Defines the number of FCC whole file cache subdirectories.
Subdirectories
FCC_MaxWriteCacheSize 1G Defines the maximum size (in bytes) of the FCC whole file
write cache. Use the suffixes K, M, G and T to represent
kilobytes, megabytes, gigabytes, and terabytes, respectively.
FCC_MaxReadCacheSize 1G Defines the maximum size (in bytes) of the FCC whole file
read cache. Use the suffixes K, M, G and T to represent
kilobytes, megabytes, gigabytes, and terabytes, respectively.
FCC_MaximumRead 180 Defines the maximum idle age (in days) of a file in the FCC
CacheAge whole file read cache. Files that have not been accessed in
longer than the time period defined are removed from the
cache.
FCC_MinimumRead 240 Defines the minimum read cache age (in minutes). The FCC
CacheAgeMinutes deletes files from its WholeFileReadCache only if they have
not been accessed within the specified amount of time.
FCC_MaximumWrite 180 Defines the maximum idle age (in days) of a file in the FCC
CacheAge whole file write cache. Files that have not been accessed in
longer than the time period defined are removed from the
cache.
FCC_MinimumWrite 10 Defines the minimum write cache age (in minutes). The FCC
CacheAgeMinutes deletes files from its WholeFileWriteCache only if they
have not been accessed within the specified amount of time.
For example, if set to 25, when the cache reaches 100% of its
maximum size, the FCC begins to purge the least recently
accessed files until the cache size is reduced to 75% or less of
its maximum size.
FCC_WriteCachePurgeSize 25 Defines the minimum percentage of free space purged when
Percentage the FCC whole file write cache becomes full.
For example, if set to 25, when the cache reaches 100% of its
maximum size, the FCC begins to purge the least recently
accessed files until the cache size is reduced to 75% or less of
its maximum size.
The following table lists the values available for FCC segment cache parameters.
FCC_MaximumNumberOf 512 Defines the number of data segments in the base segment
Segments file. This number does not include extents.
FCC_HashBlockPages 2048 Defines the maximum number of hash block pages. Each
hash block contains 128 hash entries.
FCC_MaxExtentFiles 32 Defines the maximum number of extant files.
FCC_MaxExtentFileSize 16 Defines the maximum size (in megabytes) of each extent file.
Megabytes This number is rounded to a multiple of 16 megabytes.
• The table method provides sizing parameters in table format. Determine your
cache sizing requirements by comparing your environment’s parameters with
the parameters specified in the table method sizing tables.
For more information, see Table method for sizing the FMS fast cache.
Five basic parameters are used to calculate fast cache sizing requirements. These
parameters are known by different attribute names depending on the context for
which the fast cache instance is being configured, but the same five parameters are
represented in all cases.
Use the following parameter values to calculate your fast cache sizing requirements
using any of the three sizing methods. The default values are for generic and
unspecified FMS cache implementation. These settings are seldom used except in
cache testing. The Teamcenter Environment Manager (TEM) installer typically
calculates and sets its own defaults for FSCs and FCCs at installation, based on your
input. TEM defaults are the values with which FMS initially attempts to operate. If
the installer does not provide defaults, or these parameters are commented out or
removed, the FSC and FCC configuration parameter default values are used.
For the default parameters, see General FSC configuration parameters and General
FCC configuration parameters.
Note TEM defaults override the following defaults, and the general FSC and FCC
configuration parameter defaults. TEM defaults are subject to change,
without notice, from version to version. TEM defaults do not use the
optimized methods for calculating cache size.
Apply the calculations listed in Memory considerations when sizing the FMS fast
cache.
The fast method provides a quick estimate of the parameters appropriate for cache
sizing, with a minimum of manual calculation. Use this method for in between cache
sizes that do not appear in the fast method sizing tables.
The following table lists the parameters and calculations required to calculate fast
cache size using the fast method, based on a total cache size of x MB.
Parameter Calculation
Maximum size 2032000 MB (~2 TB) in 32-bit
This is an absolute maximum. Do not allocate more file pages unless also
adding segments or extents.
This calculation sizes the hash table with a generous hash ratio (10:1 or
greater). It is unlikely that increasing the number of hash pages above this
amount will increase the efficiency of the fast cache.
FCC calculations
Maximum number of extent files files = xunits – 1
Parameter Calculation
Maximum extent file size size = 16 (units are in MB)
Note On Windows, you can increase extent file size and reduce the
number of extent files until maxfiles < 1000 (or another arbitrary
directory size limit). The size parameter must remain a multiple
of 16. Round down to achieve the desired multiple of 16.
FSC calculations
Maximum number of extent files files = 2
Maximum extent file size size = xunits * 8
Note On 32-bit, you can add extent files and reduce the extent file size
until the size of each extent file is less than the maximum (2032
MB). The size parameter must remain a multiple of 16. Round
down to achieve the desired multiple of 16.
Decrement files
Segment calculations
segs segs = (xunits – (files * size / 16) ) * 1024.
Check for maximum segs in the parameter table in Overview of FMS fast
cache methods. You can move segments to extent files as needed to maintain
segs in the desired range.
You can increase the number of extent files, if needed, to keep both segs
and size in the desired range.
Apply the calculations listed in Memory considerations when sizing the FMS fast
cache.
Example 1: 4 GB cache
The following example calculates fast cache size using the fast method, showing that
a 4 GB cache contains 4096 MB of segment space.
Parameter Calculation
Maximum size check x = 4096 < 2032000
Total 16 MB segments tsegs = 4096 * 64 = 262144
16 MB extent units xunits = 4096 / 16 = 256
Maximum number of fpages = tsegs
512-byte file pages
Thus fpages = 262144
This is an absolute maximum. Do not allocate more file pages unless also adding
segments or extents.
Parameter Calculation
Metafile size check 262144 < 2097151
Maximum number of hpages = fpages / 12.8
512-byte hash pages
Thus hpages = 262144 / 12.8 = 20480
This calculation sizes the hash table with a generous hash ratio (10:1 or greater).
It is unlikely that increasing the number of hash pages above this amount will
increase the efficiency of the fast cache.
Note On Windows, you can increase extent file size and reduce the number
of extent files until maxfiles < 1000 (or another arbitrary directory
size limit). The size parameter must remain a multiple of 16. Round
down to achieve the desired multiple of 16.
Thus files = 3
And size = 1360 (the next multiple of 16 MB smaller than 1365 MB)
Decrement files files = 2
Segment calculations
Parameter Calculation
segs (in 16 KB) segs = (xunits - (files * size / 16) ) * 1024
Check for maximum segs in the parameter table in Overview of FMS fast cache
methods. You can move segments to extent files as needed to maintain segs in
the desired range.
Note Moving segments to extent files can not be performed on the HP-UX
platform. HP-UX installations must work with the amount of cache
that fits in the segment file.
You can increase the number of extent files, if needed, to keep both segs and
size in the desired range.
Segment file size check 88064 > 65535 (This must be adjusted on a 32-bit machine.)
Excess segment check Excess is 88064 – 65535 = 22529 16K segments, which converts to (22849 / 1024)
= 22+ extent units (of 16 KB each)
Excess per extent is 22+ / 2 = 11+ (16 MB extent units per extent file), thus you
must add at least 12 16-MB units to each extent file so the segment file is no
longer oversized. Add 12 16-MB units to each extent file, and subtract 24 16-MB
units from the segment file.
Apply the calculations listed in Memory considerations when sizing the FMS fast
cache.
Example 2: 40 GB cache
The following example calculates fast cache size using the fast method, showing that
a 40 GB cache contains 40960 MB of segment space.
Parameter Calculation
Maximum size check x = 40960 < 2032000
Total 16 MB segments tsegs = 40960 * 64 = 2621440
16 MB extent units xunits = 40960 / 16 = 2560
File pages fpages = tsegs
This is an absolute maximum. Do not allocate more file pages unless also adding
segments or extents.
Parameter Calculation
Maximum number of 512-byte 2097151
file pages
Hash pages hpages = fpages / 12.8
This calculation sizes the hash table with a generous hash ratio (10:1 or greater).
It is unlikely that increasing the number of hash pages above this amount will
increase the efficiency of the fast cache.
FCC calculations
Maximum number of extent files = xunits – 1
files
Thus, 2560 – 1 = 2559
Maximum extent file size size = 16 (units are in MB)
Windows directory check 255 > 1000
Note On Windows, you can increase extent file size and reduce the number
of extent files until maxfiles < 1000 (or another arbitrary directory
size limit). The size parameter must remain a multiple of 16. Round
down to achieve the desired multiple of 16.
Thus files = 21
And size = 1936 (the next multiple of 16 MB smaller than 1365 MB)
Decrement files files = 20
Parameter Calculation
Segment calculations
Parameter Calculation
segs (in 16 KB) segs = (xunits - (files * size / 16) ) * 1024
Check for maximum segs in the parameter table in Overview of FMS fast cache
methods. You can move segments to extent files as needed to maintain segs in
the desired range.
Note Moving segments to extent files can not be performed on the HP-UX
platform. HP-UX installations must work with the amount of cache
that fits in the segment file.
You can increase the number of extent files, if needed, to keep both segs and
size in the desired range.
Segment file size check 143360 > 65535 (This must be adjusted on a 32-bit machine.)
Excess segment check Excess is 143360 – 65535 = 77825 16K segments, which converts to (59905 /
1024) = 76+ extent units of 16 KB each.
Excess per extent is 76+ / 20 = 3+ (16 MB extent units per extent file), thus you
must add at least 4 16 MB units to each of the 20 extent file so the segment file is
no longer oversized. Then subtract 80 16 MB units from the segment file.
Apply the calculations listed in Memory considerations when sizing the FMS fast
cache.
Parameter Calculation
Maximum size 2032000 MB (~2 TB) in 32-bit
Parameter Calculation
File pages File pages are relatively inexpensive, and it is important that they are always
available. A single 512-byte file page can hold references for up to 35 segments
(UNIX) or 36 segments (Windows). If the file page is full, this represents less than
a tenth of a percent of the cache size.
The fast method uses the calculation of fpages = tsegs. This calculation
provides the maximum number of file pages that may be needed for the
number of segments calculated. This is sufficient and affordable for small and
moderate-sized caches. For larger caches, use the maximum.
This is an absolute maximum. Do not allocate more file pages unless also adding
segments or extents.
Hash pages Use hash pages to look up file pages corresponding to a file GUID. Each hash
page holds 128 hash bins. Siemens PLM Software recommends industry standard
hash ratios (hratio) of 4:1 to 10:1 for standard hashing algorithms.
FCC calculations
Maximum number of extent The FCC creates complete extent files as they are needed. If the extent files are
files large, creating them can take a significant amount of time, causing the FCC
client to appear to stall while the extent file is created. Siemens PLM Software
recommends you configure the FCC with relatively small extent files.
The use of small extent files results in a large number of extent files created in
the cache directory. Directory lookup performance degrades when many files
with similar names are in the same directory, particularly on Windows. To
prevent poor performance, limit the number of extent files to some arbitrary
limit. Siemens PLM Software recommends no more than 1000 extent files per
cache instance, whenever this is possible.
files = xunits – 1
Maximum extent file size size = 16 (Units are in MB.)
Note On Windows, you can increase extent file size and reduce the number
of extent files until maxfiles < 1000 (or another arbitrary directory
size limit). The size parameter must remain a multiple of 16. Round
down to achieve the desired multiple of 16.
segs (in 16 KB segments) The refined method calculations size the segment file as if it were another extent
file. However, unlike extent files, the segment file is completely and continuously
memory-mapped. Therefore, data stored in the segment file is accessed
significantly faster than extent data. Siemens PLM Software recommends putting
as much of the segment data in the segment file as memory considerations allow.
segs = size * 64
FSC calculations
Parameter Calculation
segs (in 16 KB segments) Unlike the FCC, the FSC fast cache appends to the end of existing extent files in
16-MB sections. This limits the maximum delay during any single transaction. As
the cache grows it causes more, but smaller, delays. A single extent file is ideal,
except you must have some data in the segment file as well. Thus, start with two,
and decrement the count when you move some of that data into the segment file.
Maximum number of extent files = 2
files
Maximum extent file size size = xunits * 8
Note On 32-bit, you can add extent files and reduce the extent file size until
the size of each extent file is less than the maximum (2032 MB). The
size parameter must remain a multiple of 16. Round down to achieve
the desired multiple of 16.
Decrement files
segs (in 16 KB segments) segs = (xunits – (files * size * 16) ) * 1024
Maximum segment check Check for maximum segs in the parameter table in Overview of FMS fast cache
methods. You can move segments to extent files as needed to maintain segs in
the desired range.
You can increase the number of extent files, if needed, to keep both segs and
size in the desired range.
Supported
operating system Partial mapping Allows extent files
Windows Yes Yes
AIX Yes
Sun Yes
Linux Yes Yes
HP-RISC No No
HP-Itanium No No
Macintosh
Note This table method does not support the HP-UX platform. This platform does
not support partial mapping, and it fails when the same file (or section of
file) is memory-mapped a second time by the same process. These limitations
effectively prevent the fast cache from mapping extent files. Thus, on this
platform, the number of extent files must be set to 0 to prevent failures
and the total amount of fast cache on the machine (including hash files,
metafile, and segment space) is limited to the amount of shmem available in
the operating system kernel.
Refer to the HP-UX example tables for information on sizing the fast cache
when running on a HP-UX platform.
The following table lists sizing requirements for an FCC, 128 MB shareable memory
per user, partial mapping supported.
The following table lists sizing requirements for an FCC, 256 MB shareable memory
per user, partial mapping supported.
The following table lists sizing requirements for an FCC, 512 MB shareable memory
per user, partial mapping supported.
The following table lists sizing requirements for an FCC, 1 GB shareable memory
per user, partial mapping supported.
The following table lists sizing requirements for an FCC, 1.5 GB shareable memory
per user, partial mapping supported.
The following table lists sizing requirements for an FCC, 256 MB shareable memory
per user, no partial mapping supported.
The following table lists sizing requirements for an FCC, 512 MB shareable memory
per user, no partial mapping supported.
The following table lists sizing requirements for an FCC, 1 GB shareable memory
per user, no partial mapping supported.
The following table lists sizing requirements for an FCC, 1.5 GB shareable memory
per user, no partial mapping supported.
The following table lists sizing requirements for a 32-bit FSC, 128 MB shareable
memory per cache, partial mapping supported.
Note There are two fast caches for each FSC: read cache and write cache. You can
surpass the read cache’s memory consumption recommendations in these
tables if you reduce the write cache by an equivalent amount.
For example, a read cache with 768 MB memory with a write cache of 256
MB memory consumes a total of approximately 1 GB memory. The total
memory consumption should allow space for the FSC process code, JRE, and
cache memory usage that does not exceed the process or machine limits.
This is 2 GB for 32-bit processes.
The following table lists sizing requirements for a 32-bit FSC, 256 MB shareable
memory per cache, partial mapping supported.
The following table lists sizing requirements for a 32-bit FSC, 512 MB shareable
memory per cache, partial mapping supported.
The following table lists sizing requirements for a 32-bit FSC, 768 MB shareable
memory per cache, partial mapping supported.
The following table lists sizing requirements for a 32-bit FSC, 256 MB shareable
memory per cache, no partial mapping supported.
The following table lists sizing requirements for a 32-bit FSC, 512 MB shareable
memory per cache, no partial mapping supported.
Memory used
Cache size Hash File pages Segments Extent files Extent file size (MB per cache)
MB pages MB
1 5 64 64 0 16 2
Memory used
Cache size Hash File pages Segments Extent files Extent file size (MB per cache)
MB pages MB
32 160 2048 2048 0 16 34
256 1280 16384 16384 0 16 265
2048 2374 30393 1024 13 160 512
(2 GB)
16384 2374 30393 1024 103 160 512
(16 GB)
The following table lists sizing requirements for a 32-bit FSC, 768 MB shareable
memory per cache, no partial mapping supported.
The following table lists sizing requirements for a 64-bit FSC, 2 GB shareable
memory per cache, partial mapping supported.
The following table lists sizing requirements for a 64-bit FSC, 4 GB shareable
memory per cache, partial mapping supported.
The following table lists sizing requirements for a 64-bit FSC, 8 GB shareable
memory per cache, partial mapping supported.
The following table lists sizing requirements for a 64-bit FSC, 16 GB shareable
memory per cache, partial mapping supported.
The following table lists sizing requirements for a 64-bit FSC, 32 GB shareable
memory per cache, partial mapping supported.
The following table lists sizing requirements for a 64-bit FSC, 2 GB shareable
memory per cache, no partial mapping supported.
The following table lists sizing requirements for a 64-bit FSC, 4 GB shareable
memory per cache, no partial mapping supported.
The following table lists sizing requirements for a 64-bit FSC, 8 GB shareable
memory per cache, no partial mapping supported.
The following table lists sizing requirements for a 64-bit FSC, 16 GB shareable
memory per cache, no partial mapping supported.
The following table lists sizing requirements for a 64-bit FSC, 32 GB shareable
memory per cache, no partial mapping supported.
Every client or server on a system receives maximum memory benefit while the
amount of memory consumed by the cache does not exceed the amount of memory
available on the system for file memory mapping.
On a single-user Windows workstation, the amount of memory available for file
memory mapping is easy to calculate. On multiuser workstations, or in environments
with multiple caches, the system may virtually map the memory mapping files,
giving each process more apparent memory than it actually has.
It is important to ensure your system has sufficient swap space (or temporary
storage) to virtualize efficiently. If your system does not virtualize the mappable
memory, the mappable memory may need to be proportioned (shared) among the
maximum number of consumers. For example, on a 64-bit machine with 10 GB of
RAM and 15 users, each user gets about 660 MB of mappable memory.
The following table lists the amount of shared memory required per FMS fast
cache parameter.
1On systems that allow partial mapping, up to three 16384-byte windows are
mapped to extent files.
2On some systems, the entire extent file is memory mapped, regardless of the
partial mapping requested by FMS.
3On HP-UX (including 64-bit Itanium systems), extent files are not supported.
HP-UX does not allow an application to unmap and remap the same
extent file more than once in the same process. The system may display a
FMSC_ERROR_UTIL_BAD_VM_POINTER message due to a bad virtual memory
pointer returned by the system mmap() library call. Given this limitation, the
only functionality the fast cache offers for this platform is an exclusive segment file
operation, for a maximum of 1 GB of fast cache.
1On systems that allow partial mapping, up to three 16384-byte windows are
mapped to extent files.
2On some systems, the entire extent file is memory mapped, regardless of the
partial mapping requested by FMS.
In this example, the memory in both the FSC cases exceed the memory available
on the machine (1 GB = 1024 MB). Additionally, each FSC has two fast caches,
the read cache and the write cache. To correct for this, you must split each of the
caches into more extent files.
Two factors take the cache memory consumption over the limit: the segment file and
the extent files. Compute how much memory you have to spare, then split that
amount evenly among these two factors. For example, if the FSC process consumes
128 MB of memory just for the JRE and the FSC code and data areas, subtract this
amount, and the two hash files, and the two metafiles from the 1 GB of available
memory:
1024 MB – 128 MB (JRE/FSC) – 20 MB (hash files) – 256 MB (metafiles) = less than 620 MB
Allocate half of the available memory (approximately 300 MB) for each cache. To
allow for situations in which the entire extent file is memory mapped, allocate half of
each cache’s ration (150 MB) to the three extent files that may be memory-mapped
at any given time. This provides for three 50 MB extent files. Each extent file needs
to be a multiple of 16 MB, so the files can be either 48 MB or 64 MB. Either size has
only a slight affect on the size of the segment file, but 48 MB noticeably reduces the
number of extent files. It is better to choose the larger size, 64 MB. This results in
(300 – (3 * 64) ) = 108 MB of memory into which the segment file can be mapped.
Therefore, the maximum extent file size is 64 MB, and the Maximum number of 16
KB segments is 108 * 64 = 6912.
Use these figures to calculate the maximum number of extent files:
files = ( (4096 MB – 108 MB) / 64 M) = 62
Taken into account all of these memory considerations revises the above fast cache
calculations as follows.
File Size Shared memory used FSC
Hash file (20480 + 1) * 512 10486272 10+ MB
Metafile (262144 + 1) * 512 134218240 128+ MB
Segment file 63488 * 16384 113246208 108 MB
Extent files1 3* 16384 49152 48 KB
Extent files2 3* 64 * 1048576 201326592 192 MB
Total1 257999872 246+ MB
Total2 459277312 438+ MB
2Onsystems in which the entire extent file is mapped, regardless of the partial
mapping requested by FMS:
JRE/FSC 128 MB
Read cache 438+ MB
Write cache 438+ MB
Total 1004 MB
On HP-UX (including 64-bit Itanium) systems, in which extent files are not
supported, the cache must fit in the available memory, thus, available = 1024 MB –
128 MB (JRE/FSC) = 896 MB. In this situation, memory consummation must be less
than 448 MB per cache. Because there are no extent files, this is accomplished by
reducing the number of segments, which effectively reduces the size of the cache.
Resize the segment file to 433 MB. (433 MB is approximately 97 percent of 448
MB, rounded down. The other 3 percent account for the memory consumed by the
resized metafile and the hash file).
The calculations for an HP-UX system are listed in the following table:
File Size Shared memory used FSC
Hash file (2165 + 1) * 512 1108992 1+ MB
Metafile (27712 + 1) * 512 14189056 13+ MB
Segment file 27712* 16384 454033408 433 MB
Extent files 0 0 0 KB
Total 469331456 447+ MB
JRE/FSC 128 MB
Read cache 447+ MB
Write cache 447+ MB
Total 1023 MB
1On systems which allow partial mapping, up to three 16384-byte windows are
mapped to extent files.
2On some systems, the entire extent file is memory mapped, regardless of the
partial mapping requested by FMS.
In this example, the memory in both FSC cases exceed the memory available on the
machine (1 GB = 1024 MB). Additionally, each FSC has two fast caches, the read
cache and the write cache. To correct for this, you must split each of the caches
into more extent files.
In this example, the metafile is considered. You can reduce metafile size by reducing
the number of file pages. With caches this large, you can assume an average file size,
and use that assumption to compute an average number of file headers per file. For
example, let average represent the average file size, in bytes, understanding that
some files are actually larger, and some smaller:
Calculation Definition
filesegs = average / 16384 The average file consumes some number of segments.
Round up.
filepages = filesegs / 35 (UNIX) The average file consumes some number of file pages.
Round down.
fpages = segs / averagerefs Fewer file pages are required to serve the larger files.
Round up.
Note If you expect to fill the 40 GB cache with very small files (smaller than
16 KB) you need all of this metafile space to track all the individual files.
Therefore, you need more memory on your machine, or accept working with
a smaller cache.
Calculation Definition
average = 1468006 Average bytes per file.
filesegs = 1468006 / 16384 = 89.6 Average file segments per file.
Round up to 90.
filepages = 90 / 35 (UNIX) = ~2.6 Average file pages per file.
Round down.
fpages =2621440 / 30 = 87382 Required number of file pages.
File Size Shared memory used FSC Size Shared memory used FCC
Hash file (20480 + 1) * 512 10486272 10+ MB (20480 + 1) * 512 10486272 10+ MB
Metafile (262144 + 1) * 512 134218240 128+ MB (262144 + 1) * 512 134218240 128+ MB
Next, recalculate the available memory, decrease the number of segments, and
increase the number of extent files to bring the segment and extent files into
alignment.
For more information on these steps, see Example 1: 4 GB cache using fast method.
Administering FMS
Administering FSCs
The fscadmin utility monitors and controls FSC servers. Use this utility to check
the status of a server, perform a shutdown, modify logging levels, query performance
counters, and to clear or inspect caches. You can also use this utility to route these
administrative commands from one FSC to any other FSCs in the local network. For
more information about using this utility, see the Utilities Reference.
There are circumstances when you will need to manage your FMS file server
cache(s). For example, when you make a change to the fmsmaster.xml file
on the master host, you must restart all FSCs. To manually change your FMS
configuration, you might need to install and/or uninstall components.
Note In the following instructions, FMS_HOME refers to the location the FSC
is installed. This may or may not be the same setting as the FMS_HOME
system environment variable, set in the user’s environment.
If you installed the FSC as a service, you must start the service via Windows
Services. Manage your FSC service via the Windows Services dialog box
(Start→Control Panel→Administrative Tools→Services).
• To check the status of the read and write cache, enter the following:
%FMS_HOME%\fscadmin –s http://hostname:port
FSC_hostname_user/cachesummary/read
Example: %FMS_HOME%\fscadmin –s http://evalwin8:3805
dev15/cachesummary/read
%FMS_HOME%\fscadmin –s http://hostname:port
FSC_hostname_user/cachesummary/write
Example: %FMS_HOME%\fscadmin –s http://evalwin8:3805
dev15/cachesummary/write
• To check the status of the read and write cache, enter the following:
%./fscadmin.sh –s http://hostname:port
fsc_hostname_user/cachesummary/read
The FSC can fail to start after a reboot of UNIX systems. This can occur when other
services upon which the FSC depends have not yet started.
For example, the ypbind service can take additional time to start. Because the
ypbind service was not operational when the FSC attempted to start, the su
operation failed to switch to the user required to start the FSC.
In this case, correct the reason the ypbind service launches slowly. Because Siemens
PLM Software is not directly contributing to the slow launch of the ypbind service,
the resolution must be investigated by your IT department on a case-by-case basis.
One workaround is to add a pause in the startup script. A sleep value of 120 seconds
is sufficient in test systems. The sleep command must be added to the startup
script in the rcname.d directory. Do not modify the rc scripts under the TC_ROOT
directory; these are not the scripts first called.
Note Renaming the rc script in the rcname.d directory to force the service to
boot later in the boot order does not provide sufficient time to allow the
ypbind service to start in test systems.
2. Review the backup.xml file to determine the enterpriseID, volumeUid, and the
wntPath or unixPath.
Enter the following values into the appropriate location within the
fmsmaster.xml file.
fmsenterprise id= enterpriseID
volume id= volumeUid
root= wntPath
root= unixPath
3. Edit the fsc_hostname_user and fcc.xml files, if necessary. For example, if you
are changing cache locations.
4. Stop and restart the FSC process. For information on stopping and starting
FSCs, see Managing your FSC on Windows and Managing your FSC on UNIX.
You can copy all or part of the whole file cache using operating system commands,
and then transfer the data electronically or physically to another site. This is
useful when setting up a deployment site. Copying the whole file cache from a test
environment to a deployment environment reduces the time it takes to populate
the cache and improves performance.
This procedure works best when both FSCs belong to the same enterprise ID,
providing superior performance over a WAN.
• Replicate the ImanFile objects belonging to the owning site as stubs at the
remote site.
For more information, see the Multi-Site Collaboration Guide.
Note Massive WFC (Whole File Cache) sometimes can be spread across different
physical disk partitions. The WFC copy works if both the source and
destination have the same WFC configuration (the same number of disk
partitions and the same number of hash directories).
• You can use platforms such as HP for large FSC whole file caches. Platforms
that previously had issues with the segment cache or virtual memory mapping
can be used with large FSC whole file caches by using the NFS style whole file
disk storage (although JT segments that are not whole file are still stored in the
segment cache). Whole JT files can be prepopulated to avoid segment caching.
• You can use redundant disk storage (or RAID) rather than dual FSC caches. You
can still run two FSCs for high availability off of the network storage.
• FSC whole file cache reliability is increased to OS level file reliability. Loss of
a directory entry now results in single file loss, improving the durability and
reliability of the whole file cache.
• You can do a disk copy to transfer an FSC cache, or copy the FSC whole file
cache to a DVD and mail it. A background garbage collection process runs to
prune the whole file cache. The cycle on this may be several hours for very large
FSC whole file caches.
Administering FCCs
• WebRAID considerations
To use WebRAID with a forward proxy, the forward proxy host and port
for the appropriate protocols (HTTP or HTTPS), must be specified in the
FMS_HOME\fcc.properties file as follows:
http.proxyHost=forward-proxy-host
http.proxyPort=forward-proxy-server-port
https.proxyHost=forward-proxy-host
https.proxyPort=forward-proxy-server-port
You must also configure the same information in the fwdproxy_cfg.properties
file in the Teamcenter client communication system (TCCS) configuration
directory.
• Stopping an FCC
It is important that you shut down TCCS/FCC in a prescribed manner. Not
following one of several recommended methods can result in FCC and TCCS
errors.
You are strongly advised not to use an operating system kill command to shut
down a TCCS/FCC instance unless safer methods have failed.
For more information, see Shutting down a TCCS/FCC instance.
• Restarting an FCC
You may need to restart a TCCS/FCC instance when:
o You have changed FCC cache parameters that require a restart.
For information about which cache parameters require an FCC restart, see
Elements requiring a restart of an FCC.
• Reconfiguring an FCC
There are three ways to reconfigure an FCC. Each method involves a different
level of user interaction and a different set of restrictions.
• You need to stop and restart the instance to receive new configuration
information.
For more information about when and why to restart a TCCS/FCC instance, see
Elements requiring a restart of an FCC.
Regardless of why you stop an FCC, remember that the FCC runs within the TCCS
container process. Stopping an FCC also stops the TcServerProxy and TcMEM
processes.
Before stopping a TCCS/FCC instance, close all client applications and wait 10
seconds.
Note Siemens PLM Software does not recommend using the operating system
kill command or the Windows Task Manager to stop an FCC unless
safer methods have failed. Doing so can cause issues with the FMS
fast cache, the FCC cache lock, the TCCS process lock, and any active
FCC/TcServerProxy/TcMEM transactions.
Warning On Windows Vista and later (including Windows 7), JRE shutdown
hooks are not honored, preventing the FCC from closing cleanly. If the
TCCS/FCC instance remains running when users log off (or shut down)
these operating systems, the FCC segment cache may be corrupted.
Siemens PLM Software recommends you add the fccstat -kill command
to all user logoff scripts and to any relevant Windows shutdown scripts
for Teamcenter clients running on these operating systems.
For more information about running the fccstat -kill command, see
method 2 that follows.
For more information about working with Windows shutdown scripts,
see the Microsoft documentation at:
http://technet.microsoft.com/en-us/library/cc753404.aspx
The following methods for stopping an FCC are listed in the order by which they
reduce the risk of corrupting the cache or creating a stuck lock file. If after stopping
an FCC, it does not properly restart, reset the user’s FCC environment.
For more information, see Reset a user’s environment.
• Method 1
o Run $FMS_HOME/bin/fccstat -stop.
If nonidle clients are connected to the FCC or other TCCS applications, a message
appears and the FCC is not stopped. If you receive this message, confirm that all
client applications are disconnected from FCC/TCCS, wait 10 seconds, and retry.
Note An FCC client is nonidle if it holds an open FCC file handle, an open
segment cache handle, or an open pipe connection that has made a
request within the past 5 to 10 seconds.
This method is effective 90 percent of the time and results in the cleanest
possible shutdown. The FCC can be restarted afterward with no data loss.
• Method 2
o Run $FMS_HOME/bin/fccstat -kill.
• Method 3
If a TCCS/FCC instance is not responsive to FCC pipe commands, it may report
FCC Offline though the TCCS/FCC process is running. In this situation, use
the tspstat or tcmemstat utility to stop the shared TCCS process.
This method is highly effective and usually results in a clean shutdown of the
FCC.
This method stops an FCC if it is idle or nonidle, even when it is not responsive
to pipe commands.
This method stops the FCC as cleanly as possible. The effect is similar to method
2, but it is possible that file handles become stuck or that cache states are lost.
This method performs a hard stop on the FCC. Usually, the contents of the FCC
fast cache (segment cache) are lost. Occasionally, the FCC lock file becomes stuck.
This method performs a hard stop on the FCC. Usually, the contents of the FCC
fast cache (segment cache) are lost. Occasionally, the FCC lock file becomes stuck.
Restarting an FCC
Restart an FCC
Any change to the FCC properties file requires a manual restart of the FCC.
Some changes to FCC elements cannot be automatically propagated to the FCC when
you reconfigure the FMS master configuration file (fmsmaster.xml) or local FCC file
(fcc.xml). When you reconfigure these elements, you must manually stop and restart
the FCC. All FCC applications and the FCC must be shut down and then restarted.
1. Close all client applications.
2. Wait 10 seconds.
If this method does not work, stop and restart the FCC:
1. Stop the FCC.
For more information, see Shutting down a TCCS/FCC instance.
FCC_ProxyPipeName
FCC_CacheLocation
FCC_StatusFrequency
• Logging elements
The following FCC logging elements require a manual restart of the FCC:
FCC_LogFile
FCC_LogLevel
FCC_TraceLevel
FCC_WholeFileCacheSubdirectories
FCC_CacheTableHashSize
FCC_MaxWriteCacheSize
FCC_MaxReadCacheSize
FCC_MaximumReadCacheAge
FCC_MaximumWriteCacheAge
FCC_ReadCachePurgeSizePercentage
FCC_WriteCachePurgeSizePercentage
FCC_CachePurgeCycle
FCC_MaximumNumberOfFilePages
FCC_MaximumNumberOfSegments
FCC_HashBlockPages
FCC_MaxExtentFiles
FCC_MaxExtentFileSizeMegabytes
3. Reset the user’s system environment using one of the following methods:
• On a single-user machine, restart (or shut down and reboot) the operating
system.
4. Remove the following files from the user’s FCC cache directory. Corruption in
any of these files can prevent the FCC from restarting:
• fcc.lck
• fms.hsh
• fms.mf
• fms.set
Reconfiguring an FCC
There are three ways to reconfigure an FMS client cache (FCC). Each method
involves a different level of user interaction and a different set of restrictions.
• Automatic reconfiguration of the FCC
Automatic reconfiguration of the FCC occurs when changes are made to the
fmsmaster.xml file and the master FMS file server cache (FSC) configuration
server is reconfigured. Not all FCC changes are reconfigured automatically.
Many changes to FMS client cache (FCC) elements are automatically
propagated to the FCC when you reconfigure the FMS master configuration
file (fmsmaster.xml).
For example, the FCC detects when changes are made to the following
FCCDefault parameters in the master configuration file and reconfigures itself
accordingly, without interrupting FCC client application service:
o FCC_TransientFileFSCSource
o FCC_EnableDirectFSCRouting
o FCC_WebRaidThreshold
o FCC_MaxWANSources
o FCC_FSCConnectionRetryInterval
The FCC also detects when changes are made to the following FCC configuration
elements in the master configuration file and reconfigures itself accordingly,
without interrupting FCC client application service:
o FCCDefaultssite
o parentfsc
o assignment
Using the FCC assignment mode element to override default client mapping
behavior
A client mapping is a list of assignedfsc elements appropriate for a particular
client’s IP address and/or domain name.
Static client mapping is not always appropriate, because it is possible for a client to
change network contexts without changing its IP address or domain name.
Example A user takes a company laptop from the office to a hotel room. The FMS
server cache (FSC) is inaccessible because the client has moved outside
the company firewall. To access company data from the public side of the
firewall, the user must use a different FSC server (or at least a different
access address) than the server used in the office.
Example A user takes a company laptop from the office to a remote location. At
the remote location, the client continues accessing data over a WAN,
using the client mapped assignedfsc elements, even though the data is
now more readily accessible from an FSC in a local satellite office. This
is inefficient, as the WAN connection is slower than accessing the data
from the FSC servers in the same office.
It is more efficient to change the default assignment mode setting from clientmap
to parentfsc.
• clientmap
With this setting, FCC data requests are routed to the assignedfsc elements
specified within the clientmap section of the fmsmaster.xml configuration
file. The FCC downloads the list of assignedfsc elements from the parentfsc
element when it starts.
An assignedfsc element represents an FMS server that distributes Teamcenter
data to clients that have no direct access to the FSCs serving the origin volume.
Each clientmap section typically contains one to three assignedfsc elements.
The assignedfsc elements represent FMS cache or data servers.
• parentfsc
Use this setting when the default client mapping setting is not efficient.
With this setting, the parentfsc list is used as the assignedfsc list. FCC data
requests are routed to the list of parentfsc elements specified in the fcc.xml
configuration file.
A parentfsc element represents an FSC server that distributes FMS
configuration settings to clients upon request. Each fcc.xml file typically
contains one to three parentfsc elements.
Auditing FSCs
If all audit points are enabled, the simplest request generates at least three audit
log outputs. Ticketed requests include request, priopstart, and priopstop audit
points. Nonticketed requests include request, webopstart, and webopstop audit
points.
You can configure only the audit points desired. You can also configure only the
information of interest for output. For example, for minimal output, all audit points
can be disabled except for priopstop and webopstop. This provides information on
each request without generating multiple output lines for each request. This does
not show subordinate operations because they are not a concern.
2. Define the format to use for each audit point by adding log properties to the
fscdefaults elements in the fmsmaster configuration file. The configurations
must be cycled to take effect.
For information about defining formats and using log property elements, see
Format specifications and Audit log properties.
6. Modify the log4j.xml file to permanently set the audit logger level to info and
tune the log4j configuration if required.
• FSC_AuditLogRequestFormat
Specifies a comma-separated list of format specifications (or renderers) for the
request audit point.
• FSC_AuditLogPrimaryOperationStartFormat
Specifies a comma-separated list of format specifications for the primary
operation start audit point. Primary relates to ticketed operations.
• FSC_AuditLogPrimaryOperationStopFormat
Specifies a comma-separated list of format specifications for the primary
operation stop audit point.
• FSC_AuditLogSubordinateOperationStartFormat
Specifies a comma-separated list of format specifications for the subordinate
operation start audit point.
• FSC_AuditLogSubordinateOperationStopFormat
Specifies a comma-separated list of format specifications for the subordinate
operation stop audit point.
• FSC_AuditLogWebOperationStartFormat
Specifies a comma-separated list of format specifications for the web operation
start audit point. These are nonticketed requests, for example, FCC configuration
downloads.
• FSC_AuditLogWebOperationStopFormat
Specifies a comma-separated list of format specifications for the web operation
stop audit point.
The following example fscdefaults element shows the use of log properties:
fscdefault example:
<fscdefaults>
<!-- audit configuration -->
<property name="FSC_AuditLogDelimiter" value="|,|" overridable="false"/>
<property name="FSC_AuditLogRequestFormat" value="Text(request), PrimaryTransactionID,
RequestRemoteAddr, RequestHeader(X-Route), RequestHeader(User-Agent),
RequestLine, RequestHeader(Range)" overridable="false"/>
<property name="FSC_AuditLogPrimaryOperationStartFormat" value="Text(priopstart),
PrimaryTransactionID, Operation, RequestMethod, RequestRemoteAddr,
RequestHeader(X-Route), RequestHeader(User-Agent), RequestHeader(Range),
TicketVersion, TicketAccessMethodNice, TicketIsBinaryNice, TicketSignature,
TicketExpiresTime, TicketUserID, TicketSiteID, TicketGUID,
TicketFilestoreIDs, TicketRelativePath" overridable="false"/>
<property name="FSC_AuditLogPrimaryOperationStopFormat" value="Text(priopstop),
PrimaryTransactionID, StatusCode, Message, ResponseHeader(Content-Encoding),
TargetBytes, ActualBytes, ResponseStreamStatus, DeltaMS"
overridable="false"/>
<property name="FSC_AuditLogSubordinateOperationStartFormat" value="Text(subopstart),
TransactionID, Operation, TicketVersion, TicketAccessMethodNice,
TicketIsBinaryNice, TicketSignature, TicketExpiresTime, TicketUserID,
TicketSiteID, TicketGUID, TicketFilestoreIDs, TicketRelativePath"
overridable="false"/>
<property name="FSC_AuditLogSubordinateOperationStopFormat" value="Text(subopstop),
TransactionID, StatusCode, Message, DeltaMS" overridable="false"/>
<property name="FSC_AuditLogWebOperationStartFormat" value="Text(webopstart),
PrimaryTransactionID, Operation, RequestMethod, RequestRemoteAddr,
RequestHeader(User-Agent), RequestLine" overridable="false"/>
<property name="FSC_AuditLogWebOperationStopFormat" value="Text(webopstop),
PrimaryTransactionID, StatusCode, Message, ResponseHeader(Content-Encoding),
TargetBytes, ActualBytes, ResponseStreamStatus, DeltaMS"
overridable="false"/>
</fscdefaults>
Format specifications
Format specifications, also known as field renderers, determine the content of the
log file. Some are simple and render a single value into the log. These values may
come from transactional information, request or response headers, or even a string
constant. Others are more complex and provide some analysis. For an example, see
the ResponseStreamStatus field renderer. Any renderer can be specified in any
audit point but may not be able to produce useful information. They are grouped
depending on how they are intended to be used.
• General renderers
Available on all audit points.
Text(...) Renders the constant value provided between the parentheses. All
white space is ignored. This is used to identify the audit point type.
Examples are priopstart, subopstop, and so forth, but could be
anything in your environment.
DeltaMS Renders the delta time in milliseconds from start to stop audit
points.
StatusCode Renders the resulting status code; it may be an HTTP status
or an FSC error code.
Message Renders the resulting message; it may be the HTTP status
message or some form of error text.
TargetBytes Renders the target bytes of the operation. If the value is not
known, the output is -1.
ActualBytes Renders the actual bytes of the operation. If the value is not
known, the output is -1.
Any renderer can be included in any audit point output, although it may not be
useful. Format errors, such as unknown renderer names (misspellings), do not cause
configuration load errors, but the audit log output contains FORMATERROR in
the problem fields.
Fields that do not have required information present, such as ticket-related
renderers when no ticket is present, generally result in null in the output for that
field in the audit log.
The first output to the audit log writes the current formatting for all enabled audit
points. The formatting is also output whenever the audit configuration changes. It
does not contain information about audit points that have no formatting configured
and are therefore disabled.
The following is a sample audit log format output:
INFO - 2012/01/26-07:54:51,365 UTC - myhost123 - Active audit entry formats:
INFO - 2012/01/26-07:54:51,378 UTC - myhost123 - |,|Text(request)|,|PrimaryTransactionID
|,|RequestRemoteAddr|,|RequestHeader(X-Route)|,|RequestHeader(User-Agent)|,|RequestLine|,
|RequestHeader(Range)|,|
INFO - 2012/01/26-07:54:51,378 UTC - myhost123 - |,|Text(priopstart)|,|PrimaryTransactio
nID|,|Operation|,|RequestMethod|,|RequestRemoteAddr|,|RequestHeader(X-Route)|,|RequestHea
der(User-Agent)|,|RequestHeader(Range)|,|TicketVersion|,|TicketAccessMethodNice|,|TicketI
sBinaryNice|,|TicketSignature|,|TicketExpiresTime|,|TicketUserID|,|TicketSiteID|,|TicketG
UID|,|TicketFilestoreIDs|,|TicketRelativePath|,|
INFO - 2012/01/26-07:54:51,378 UTC - myhost123 - |,|Text(priopstop)|,|PrimaryTransaction
ID|,|StatusCode|,|Message|,|ResponseHeader(Content-Encoding)|,|TargetBytes|,|ActualBytes|
,|ResponseStreamStatus|,|DeltaMS|,|
INFO - 2012/01/26-07:54:51,378 UTC - myhost123 - |,|Text(subopstart)|,|TransactionID|,|O
peration|,|TicketVersion|,|TicketAccessMethodNice|,|TicketIsBinaryNice|,|TicketSignature|
,|TicketExpiresTime|,|TicketUserID|,|TicketSiteID|,|TicketGUID|,|TicketFilestoreIDs|,|Tic
ketRelativePath|,|
INFO - 2012/01/26-07:54:51,378 UTC - myhost123 - |,|Text(subopstop)|,|TransactionID|,|St
atusCode|,|Message|,|DeltaMS|,|
INFO - 2012/01/26-07:54:51,378 UTC - myhost123 - |,|Text(webopstart)|,|PrimaryTransactio
nID|,|Operation|,|RequestMethod|,|RequestRemoteAddr|,|RequestHeader(User-Agent)|,|Request
Line|,|
INFO - 2012/01/26-07:54:51,378 UTC - myhost123 - |,|Text(webopstop)|,|PrimaryTransaction
ID|,|StatusCode|,|Message|,|ResponseHeader(Content-Encoding)|,|TargetBytes|,|ActualBytes|
,|ResponseStreamStatus|,|DeltaMS|,|
The following is sample audit log output based on the previous configuration:
INFO - 2012/01/26-07:54:51,379 UTC - myhost123 - |,|request|,|(-7316198962075068416)fsc
_s6|,|127.0.0.1|,|null|,|FMS-FSCJavaClientProxy/8.2 (bd:20120119)|,|GET /mapClientIPToFS
Cs?client= HTTP/1.1|,|null|,|
INFO - 2012/01/26-07:54:51,380 UTC - myhost123 - |,|webopstart|,|(-7316198962075068416)
fsc_s6|,|BootstrapHandler|,|GET|,|127.0.0.1|,|FMS-FSCJavaClientProxy/8.2 (bd:20120119)|,
|GET /mapClientIPToFSCs?client= HTTP/1.1|,|
INFO - 2012/01/26-07:54:51,381 UTC - myhost123 - |,|webopstop|,|(-7316198962075068416)f
sc_s6|,|200|,|OK|,|null|,|57|,|57|,|COMPLETE|,|1|,|
INFO - 2012/01/26-07:54:51,384 UTC - myhost123 - |,|request|,|(-7316198962075068415)fsc
_s6|,|127.0.0.1|,|null|,|FMS-FSCAdmin/8.2 (bd:20120125) Java/1.5.0_11|,|GET / HTTP/1.1|,
|null|,|
INFO - 2012/01/26-07:54:51,385 UTC - myhost123 - |,|priopstart|,|(-7316198962075068415)
fsc_s6|,|CacheCommands$ClearCommand|,|GET|,|127.0.0.1|,|null|,|FMS-FSCAdmin/8.2 (bd:2012
0125) Java/1.5.0_11|,|null|,|v100|,|ADMINREAD|,|BINARY|,|739388a12ef48c3473e19bd78049661
6b989cf3b8bab1f5d5dfd0bb22a7d71db|,|2012/01/26 07:56:51|,|FSCAdmin|,||,|noguid
|,|[]|,|./clearcache|,|
INFO - 2012/01/26-07:54:51,388 UTC - myhost123 - |,|priopstop|,|(-7316198962075068415)f
sc_s6|,|200|,|OK|,|null|,|17|,|17|,|COMPLETE|,|3|,|
INFO - 2012/01/26-07:55:14,180 UTC - myhost123 - |,|request|,|(-362480191128027786)fsc_
s7[1]>fsc_s6|,|127.0.0.1|,|fms.teamcenter.com^fsc_s7,fms.teamcenter.com^fsc_s6|,|FMS-FSC
/8.2 (bd:20120125) Java/1.5.0_11|,|GET /tc/fms/fms.teamcenter.com/g2/fsc_s6 HTTP/1.1|,|n
ull|,|
INFO - 2012/01/26-07:55:14,180 UTC - myhost123 - |,|priopstart|,|(-362480191128027786)f
sc_s7[1]>fsc_s6|,|CoordinatorVolumeState|,|GET|,|127.0.0.1|,|fms.teamcenter.com^fsc_s7,f
ms.teamcenter.com^fsc_s6|,|FMS-FSC/8.2 (bd:20120125) Java/1.5.0_11|,|null|,|v100|,|ADMIN
READ|,|BINARY|,|ca124695734bb33ee6e65ba0fdbc087587214de0b43d8da2c2eb8353a3d92e89|,|2012/
01/26 07:57:11|,|nouser|,||,| |,|[]|,|fsc_s6/config/volum
estate/nvargs/action=get;enterpriseid=fms.teamcenter.com|,|
INFO - 2012/01/26-07:55:14,181 UTC - myhost123 - |,|priopstop|,|(-362480191128027786)fs
c_s7[1]>fsc_s6|,|200|,|OK|,|null|,|6|,|6|,|COMPLETE|,|1|,|
The following shows an example format specification for a primary start operation
that can be used to track access to a dataset files by users, the associated portion
of the format output, and the resulting portion in the log file output for a sample
transaction:
Transaction IDs are the key to associating all the audit information together across
the FMS network. Early in the request processing, the FSC looks for a transaction ID
in the request headers. If it finds one, it appends the local FSC ID and uses that as
its base transaction ID. If a previous one is not found, it increments an internal count
and appends its FSC ID. The internal count starts based on a secure random number.
There is no guarantee duplicate IDs are not generated, but given the range of a
64-bit value collisions, duplicates are very rare and even more unlikely in close
proximity in time. When you search for transactions, if a collision occurs, the
timestamps can be used to identify the different transactions.
Any suboperation appends [n+1] to the end of each transaction ID. A transaction
ID supplies exact information on how a request is routed though the network. The
This shows that the transaction ID on any server provides an indication of the path
through the network.
Even if intermediate FSCs do not have auditing enabled, transaction IDs are still
generated or propagated along with the requests.
Configuring FMS
Using host names rather than IP addresses can result in an file client cache (FCC)
failure. The failure appears as a Java exception in the FCC log file. For example:
java.net.UnknownHostException: (hostname)
You must specify host names as IP addresses in the following FMS XML
configuration files:
1. In the fmsmaster.xml file on the master FSC server:
Change all network domain names of all IBM AIX-hosted FSC servers to
IP addresses. Only IBM AIX-hosted FSC servers require this notation. For
example, change
<fsc id="myfsc" address="myAIXserver.mydomain.com:4444”>
to:
<fsc id="myfsc" address="250.142.16.3:4444”>
and change:
<fscimport fscid="myotherAIXfsc"
fscaddress="myotherserver.anotherdomain.net:6666”>
to:
<fscimport fscid="myotherAIXfsc" fscaddress="125.71.8.1:6666”>
These changes are picked up by the clientmap section of the FMS master
configuration file using the FSC ID.
2. In the fcc.xml file (or equivalent) for each IBM AIX client workstation, change
all FSC server network domain names to IP addresses.
For example, change:
<parentfsc address="myAIXserver.mydomain.com:4444" priority="0"/>
to:
<parentfsc address="250.142.16.3:4444" priority="0"/>
b. Install the new certificate and/or remove the domain name certificate. This
allows the clients to validate the FSC’s host name in decimal-dot notation
form.
c. Install this new certificate in the trusted certificate store of each peer FSC
and client, unless they are configured to accept self-signed certificates.
2. Set the FCC_JAVA environment variable to the JRE supplied with the
Teamcenter version with which the FCC was installed.
2. Reboot the system to propagate this setting to all users and applications.
3. Change the pipe name entry in the %FMS_HOME%\fcc.xml file. The name
must end with an alpha character. Pipe names ending in numeral characters
(0–9) are not supported. For example:
<property name="FCC_ProxyPipeName"
value="\\.\pipe\FMSClient_$USERPipe|/tmp/FMSClientPipe" overridable="true"/>
$USER is resolved by the FCC at run time to the name of the user.
4. Run the application launch script for each FMS application. This sets the
pipe name in the environment for each application. For example:
set FCC_PROXYPIPENAME=\\.\pipe\FMSClient_%USERNAME%Pipe
After the user name is substituted, the pipe name must exactly match the
FCC_ProxyPipeName value specified in the %FMS_HOME%\fcc.xml
file.
Note The pipe name must be set dynamically at run time (not in
the system environment) to properly resolve the user name
(%USERNAME%) value.
5. Reboot the system to propagate this setting to all users and applications.
If you select HTTPS as your protocol during Teamcenter installation, you are
prompted to supply the appropriate proxy, host, and port information. You are also
asked whether you want to add the URL of the local host to the list of servers defined
in the Fms_BootStrap_Urls preference. Your only post installation tasks are
generating a keystore and key entry, and generating a certificate signing request.
If you select HTTP as your protocol during Teamcenter installation, but sometime
after installation you must configure FMS to use HTTPS, you must:
• Use a trusted certificate to generate a keystore and key entry.
• Modify the FMS master file to reflect the new HTTPS addresses.
• Add the URL of the local HTTPS host to the list of servers defined in the
Fms_BootStrap_Urls preference.
• Generate a CSR.
If you chose the HTTP protocol for FMS during installation and now want to use
the HTTPS protocol, you must:
• Modify the FMS master file to reflect the new HTTPS addresses.
Update the fsc address in the FMS master file as follows:
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fmsworld SYSTEM "fmsmasterconfig.dtd">
<fmsworld>
<fmsenterprise id="471539747">
<fscgroup id="mygroup">
<fsc id="FSC_myhost_userid"
address="https://myhost.mycompany.com:4545">
<volume id="139747566d871c1b2023"
root="/mnt/disk1/tcapps/tceng2005sr1mp5/TC_VOL/volume1"/>
<transientvolume id="ce8399515feada2dee4c3e79b955d8ba"
root="/tmp/transientVolume_tceng2005sr1mp5_userid"/>
</fsc>
<clientmap subnet="127.0.0.1" mask="0.0.0.0">
<assignedfsc fscid="FSC_myhost_userid"/>
</clientmap>
</fscgroup>
</fmsenterprise>
</fmsworld>
• Add the URL of the local HTTPS host to the list of servers defined in the
Fms_BootStrap_Urls preference.
For more information about using this preference, see the Preferences and
Environment Variables Reference.
1. In the fcc.xml file, update the parent FSC address. For example:
<parentfsc address="https://myhost.mycompany.com:4545/tc/fms/471539747"/>
Element Description
keystore Specifies the keystore file name.
Note This is the Java-based storage
standard. Public and private
keys are stored in an encrypted
keystore. Individual keys within this
cryptographic storage may also have
individual password protection.
keystore.password Specifies the keystore password. The
password is required to open or manage the
keystore.
The standard entry is changeit.
FSC_myhost Specifies an alias name for the certificate.
The certificate is bound to the host; name
it accordingly. A similar convention
FSC_host_userid is used by installers to
name configuration files.
FSC_myhost.password Specifies the certificate (alias) password
required to retrieve the certificate.
FSC_myhost.csr Specifies the name of the certificate signing
request (CSR) file. The file contains the
CSR information and is sent to the signing
authority.
FSC_myhost.cer Specifies the certificate file. This is the file
returned by the signing authority.
3. Run the following command to confirm that you can read the file and view the
key entry:
>keytool –list –keystore keystore
3. Locate the CSR file. This is the file you must submit to the certificate signing
authority. For example:
-----BEGIN NEW CERTIFICATE REQUEST-----
MIIBtjCCAR8CAQAwdjELMAkGA1UEBhMCbXkxEDAOBgNVBAgTB215c3RhdGUxDzANBgNVBAcTBm15
Y2l0eTESMBAGA1UEChMJbXljb21wYW55MRIwEAYDVQQLEwlteWNvbXBhbnkxHDAaBgNVBAmTE215
aG9zdC5teWRvbWFpbi5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJ0h3iF8KBEN2UKw
hw1dw+RlxGwcsptLA3EI+6rAKa32dg/4FY89zBcUG02413X0BxQWcsRznYWFDJHLK4En7I2xeJNs
ORwJfBeF9yW6d4lzaWA6LATFr5T3DHafF6mSRNPl+739mpGuQr44AXBQWqZoOMhecc+n/ErekMlZ
dgWTAgMBAAGgADANBgkqhkiG9w0BAQQFAAOBgQCQJTqujL7GIXz0is0fUoAxtCydMiX1BeVHU+l/
IqcTh4BX8V3vJmm+kHwwKn3yeih+WJzYmDdNh/uaKxO7txyFdPPDd1bdIosFc4XIZwys0jFKwGqf
MUjB9wgaKgHSRQTtCOPBEO/ClLjm8ocFNQBWysYVevAZQAmEMp90BxBt/Q==
-----END NEW CERTIFICATE REQUEST-----
Use one of the following methods to generate a cacerts.pem file that contains the
required certificates.
• Download the trusted certificate file.
If your certificate authority (CA) signer is well known, the certificates may be
available from the Internet. Siemens PLM Software recommends you contact
your internal security team.
1. Download a current ca-bundle.crt file from the Internet, or get the file
from your internal security team. The file must be compatible with cURL
and OpenSSL.
The file must contain the certificate chain that can validate the FSC
certificate.
• Generate a trusted certificate file based on the installed Java cacerts file.
If your certificate authority (CA) signer certificates are in the Java cacerts file,
you can extract them for cURL and OpenSSL.
1. Extract the trusted certificates in the Java cacerts file in the PEM format
that cURL and OpenSSL requires, for example (Windows):
rem cd to the dir the java cacerts file is in
cd /d %JAVA_HOME%\jre\lib\security
rem cleanup leftover files from this script, and any existing cacerts.pem as we are building a new one
del /q cacerts.pem cacerts.list export.pem
rem get the aliases for all trusted certificates in the cacerts file
keytool -keystore cacerts -storepass changeit -list | find "trustedCertEntry" | sort > cacerts.list
rem for each alias export the certificate and append to the cacerts.pem file
for /f "delims=, tokens=1" %f in (cacerts.list) do keytool -export -rfc -alias %f -keystore cacerts
-storepass changeit -file export.pem & echo %f >> cacerts.pem & type export.pem >> cacerts.pem
rem cleanup leftover files from this script
del /q cacerts.list export.pem
rem cacerts.pem contains all the trusted certificates in pem format
• Generate a trusted certificate file with only the certificates required by your CA.
If your CA used new certificates, you must also acquire the signer certificates
from your CA. These must be contained within the cacerts.pem file.
1. Acquire the signer certificates, in PEM format, from your CA.
Best practices
You can configure public key infrastructure (PKI) authentication for FMS to
authorize fscadmin commands. This authentication prevents offsite administrators
(such as administrators at supplier sites) from performing unauthorized FSC
administrative commands.
Use PKI authentication to specify which fscadmin commands require additional
signing, allowing you to control the functionality available for specified servers
and installations.
Use the following best practices for optimal security.
• Password conventions
Use strong passwords.
Do not use passwords vulnerable to dictionary attacks.
Do not use password patterns that can be easily guessed if one password is
compromised.
Use different passwords for each keystore and key.
Use only encrypted passwords in property files.
Use only characters that can be reliably and repeatedly typed (or cut/pasted) into
command shells; avoid characters that make this difficult.
• Keystore conventions
The keystore type must be JCEKS; the keystore file extension must be .jceks.
Use meaningful names, such as trusted.jceks and supplier.jceks and
fsc.fscid.signing.jceks.
In each keystore, for each keystorealias element defined in the fmsmaster
configuration file, place either the private key or the public certificate. Each
private key requires that a password entry in the properties file is deployed
along with the keystore.
Place only private keys in keystores you plan to deploy to trusted sites.
Consider the keystore and its associated properties file as a pair and name them
accordingly, for example, fsc.fscid.signing.jceks and fsc.fscid.properties.
Siemens PLM Software recommends using scripts to manage keystores, generate
key pairs, export public certificates, and import the public certificates to other
keystores. Keep scripts in a secure location.
• Naming conventions
Use no spaces, commas, equal signs, or colons in the names of keystore aliases.
Use no spaces or commas in the names of policy IDs.
The keytool used in this example is from Java JDK 1.5. The conventions are those
listed in Best practices.
1. Create the trusted keystore to hold the private keys.
In this example, this is the keystore deployed to trusted servers and installations.
d. Use the keytool to create the keystore and key. For example:
> keytool -storetype jceks -keystore trusted.jceks -storepass trusted.jceks.lp7qZF.password
-genkey -v -keyalg RSA -alias "ent123.trustedadmin" -keypass trustedadmin.5oDHfVV.password
-validity 9999 -dname "CN=FMS trusted admin policy site ent123, OU=org unit, O=org, L=c, ST=st, C=cc"
Generating 1,024 bit RSA key pair and self-signed certificate (MD5WithRSA)
for: CN=FMS trusted admin policy site ent123, OU=org unit, O=org, L=c, ST=st, C=cc
[Storing trusted.jceks]
f. Use the keytool to list the contents of the keystore. For example:
> keytool -storetype jceks -keystore trusted.jceks -storepass trusted.jceks.lp7qZF.password -list -v
Keystore type: jceks
Keystore provider: SunJCE
*******************************************
*******************************************
c. Use the keytool to create and import the public certificate. For example:
> keytool -storetype jceks -keystore untrusted.jceks -storepass untrusted.jceks.2TLiFD.password
-import -v -noprompt -trustcacerts -alias "ent123.trustedadmin" -file ent123.trustedadmin.cer
Certificate was added to keystore
[Storing untrusted.jceks]
d. Use the keytool to list the contents of the keystore. For example:
> keytool -storetype jceks -keystore untrusted.jceks -storepass untrusted.jceks.2TLiFD.password -list -v
Keystore type: jceks
Keystore provider: SunJCE
Your keystore contains 1 entry
Alias name: ent123.trustedadmin
Creation date: Jul 10, 2009
Entry type: trustedCertEntry
Owner: CN=FMS trusted admin policy site ent123, OU=org unit, O=org, L=c, ST=st, C=cc
Issuer: CN=FMS trusted admin policy site ent123, OU=org unit, O=org, L=c, ST=st, C=cc
Serial number: 4a578037
Valid from: Fri Jul 10 13:53:59 EDT 2009 until: Mon Nov 24 12:53:59 EST 2036
Certificate fingerprints:
MD5: 66:6F:67:55:09:CA:04:69:52:76:C8:49:30:30:75:F0
SHA1: E4:74:66:DD:54:C2:0D:4B:D2:AD:74:EA:65:69:89:C7:0F:16:71:49
*******************************************
*******************************************
4. Create and/or modify the fscadmin property files by adding the following
properties to the fscadmin.properties file for trusted installations. (No
properties need be added for untrusted installations.)
# signing keystore file and password
com.teamcenter.fms.signing.keystore.file=trusted.jceks
com.teamcenter.fms.signing.keystore.epassword=fcLxB/oeZ+IeNnP/vofAqFpDqmJdSyaU0y+EHU0ffRc=
# default admin ticket signing alias
com.teamcenter.fms.signing.fscadmin.default.alias=ent123.trustedadmin
# key password(s) property name form: com.teamcenter.fms.signing.<alias>.epassword
com.teamcenter.fms.signing.ent123.trustedadmin.epassword=Bpg2TLiFDni3bT4xS4kyIaLvz5TWGLQ/GPTJN2r5T3s=
b. Reload the fmsmaster configuration file by stopping and starting the FSC
service or by issuing an fscadmin config reload command. For example:
fsc> fscadmin -s http://myfschost:port ./config/reload
Initial configuration hash: 9a727fb3215fc5f9bf289cb4db0b164f
Configuration reload successful.
Final configuration hash: efed77c0315fc5f9bf289cb4db0b164f
The fmsmaster configuration file, FSC properties, and signing keystores are
read each time the configuration file is reloaded.
...
INFO - 2009/07/10-18:38:55,500 UTC - cii6w223 - Keystore info:
# of private keys: 1, aliases: [ent123.trustedadmin]
# of secret keys: 0, aliases: []
# of certificates: 1, aliases: [ent123.trustedadmin]
...
6. Test to confirm the selected FSC commands are restricted. The FSC allows an
fscadmin command when a required signature for any certificate for any policy
associated with the fscadmin command is present.
If a required signature is not present, or cannot be validated, the fscadmin
command is denied.
After confirming the selected fscadmin commands are restricted, manage PKI
authorization by:
• Storing a backup of your keystores and passwords in a safe location.
• Creating new keys/certificates and deploying the new keys if you suspect a
private key is compromised.
4. Use the keytool to list the contents of the keystore. For example:
> keytool -storetype jceks -keystore trusted.jceks -storepass trusted.jceks.lp7qZF.password -list -v
Keystore type: jceks
Keystore provider: SunJCE
Your keystore contains 2 entries
Alias name: ent123.tickets
Creation date: Jul 10, 2009
Entry type: keyEntry
*******************************************
*******************************************
*******************************************
*******************************************
5. Use the keygen script to import the key file into the keystore. For example:
keygen -importseckey -keystore keystorefilename -storepass keystore.password
-alias alias [-overwrite] [-keypass key.password] [[-k keyfile] | [-key asciihexkey]]
keystore filename must end in .jceks (SecretKeys can only be stored in jceks keystores)
[-keypass key.password] is optional (defaults to storepass value)
[-overwrite] is optional, by default will not allow overwriting an existing key
Either [-k keyfile] or [-key asciihexkey] are required
The system uses the keystorealias attribute to retrieve the password from the
properties file and access the key in the keystore.
11. Create and/or modify the fscadmin property file by adding the following
properties. Use the same encrypted passwords as generated previously. For
example:
# signing keystore file and password
com.teamcenter.fms.signing.keystore.file=trusted.jceks
com.teamcenter.fms.signing.keystore.epassword=fcLxB/oeZ+IeNnP/vofAqFpDqmJdSyaU0y+EHU0ffRc=
# default fms ticket signing alias
com.teamcenter.fms.signing.tickets.alias=ent123.tickets
# key password(s) property name form: com.teamcenter.fms.signing.<alias>.epassword
com.teamcenter.fms.signing.ent123.tickets.epassword=vhTHTCLYz9BxE8TN4MpLFNIFkIrDMCfU7mh+pYbqfcw=
12. Use the fscadmin command to confirm that the keys/certificates are available.
For example:
fsc> fscadmin -s http://cii6w223:7168 ./keystoreinfo
Keystore info:
# of private keys: 1, aliases: [ent123.trustedadmin]
# of secret keys: 1, aliases: [ent123.tickets]
# of certificates: 1, aliases: [ent123.trustedadmin]
Any keys that cannot be loaded are listed in the FSC log files. For example:
java.security.UnrecoverableEntryException
at java.security.KeyStoreSpi.engineGetEntry(KeyStoreSpi.java:455)
at java.security.KeyStore.getEntry(KeyStore.java:1218)
...
14. Verify that the key has been moved by running the FSC. If the FSC runs
normally, reports that the secret key is available, and the fscadmin command
works, then the move is successful.
If the configuration is incorrect, either the FSC does not reload, or the secret key
is not listed, or the fscadmin command gives the following error:
fsc> fscadmin -s http://cii6w223:7168 ./keystoreinfo
Error, server returned status code: 400, status message: TICKET_VALIDATION_FAIL_0
15. Delete the previous clear text key file after verifying the fscadmin command
and FSC are successfully using the keystore.
After confirming the encryption key has been successfully moved to the keystore
file, manage it by:
• Storing a backup of your keystores and passwords in a safe location.
• Creating a new encryption key and deploying new keystores if you suspect the
encryption key is compromised.
• To synchronize your local clock on UNIX, run the following operating system
command:
ntpdate -u pool.ntp.org
If you encounter this problem, create the following two registry keys:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigUrl"=http://host-name/PAC-file-name"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigUrl"="http://host-name/PAC-file-name"
• TC_TMP_DIR%\%USERNAME%2TierTransientVolume on Windows
• c:\temp\%USERNAME%2TierTransientVolume on Windows
If you are using only one platform, you can delete the other value to ensure
you do not receive this error message.
2. Edit the FMS master configuration file(s) to reflect the new ID of the transient
volume(s) and/or the changed paths.
3. Either reload the configuration by stopping and restarting the FSC(s) that use
this configuration information, or reload the configuration using the fscadmin
utility. For information about stopping and starting FSCs, see Managing your
FSC on Windows and Managing your FSC on UNIX.
Reload the configuration across the entire FMS network by running the following
command:
fscadmin —s http://fschost:fscport ./config/reload/all
For more information about the fscadmin utility, see the Utilities Reference.
You can obtain a list of current volume definitions in the database by running the
backup_xmlinfo utility to generate the backup.xml file. The utility generates
transient volume information for the context in which the utility is being run (the
current TcServer context). All other server pools or hosts with transient volumes
are not identified.
The procedure for setting the TcServer context differs, depending on whether you
are on a Windows and UNIX platform.
To set the TcServer context on Windows and run the utility:
1. Run the Teamcenter command prompt to open a command window by clicking
Start→Program Files.
Note The transient volume ID and path are platform dependent. Use the ID from
either the unixPath or the wntPath.
Although a given TcServer only knows about a single logical transient volume,
other parts of the system (such as FMS) may need to work with more than one
transient volume and therefore transient volumes must be identifiable. A transient
volume’s identity is a unique value that is based on the SiteID and several of the
transient volume preferences. This identity is called the transient volume ID.
The transient volume ID listed in the FMS master configuration
file is determined by a combination of the site ID, the value of the
Transient_Volume_RootDir environment variable/preference, and the value of
the Transient_Volume_Installation_Location environment variable/preference.
Modifying any of these values changes the transient volume ID, in which case you
must manually modify the transient volume ID listed in the master configuration file.
For more information, see Transient volume configuration components.
You can obtain a list of current volume definitions in the database by running the
backup_xmlinfo utility to generate the backup.xml file. You must define which
server context for which you are generating transient volume information.
To generate transient volume information for other TcServers within the same
system, set the Transient_Volume_Installation_Location environment
variable/preference to the value used for the desired TcServer, then complete the
steps listed in Modifying the transient volume ID for the current server context.
2. Generate the new transient volume IDs one server context at a time by
completing the steps for Determining the transient volume ID for a different
server context.
3. Use the Organization application to reload the FMS configuration. For more
information about using this application, see the Organization Guide.
Administering volumes
Default volumes
Default volumes specify the default final destination volume for Teamcenter files.
Default volumes differ from default local volumes in that default volumes are the
first and final destination for Teamcenter files. Default local volumes are temporary
storage locations.
For more information, see Introduction to default local volumes.
When users upload a new file, the default volume for the file is determined by the
volume attribute of either the user or the user’s group. The system determines the
volume by working through the following values, in order (the first value to have a
valid volume is the destination volume):
• The default volume set by the user
• The default volume set by a parent group of a group to which the user belongs
Create the volumes you want to use as default volumes in the Organization
application. Creating volumes in the Organization application adds the volumes to
the List of Defined Volumes.
For more information about creating volumes, see the Organization Guide.
After you create the volumes, the option to define a default volume is available
while creating a new user, modifying an existing user, creating a new group, and
modifying an existing group.
For more information about creating users, see the Organization Guide.
You can also define a default volume for a user by choosing Edit→User Settings and
selecting a default volume from the Default Volume drop-down list.
For more information about the User Settings dialog box, see the Rich Client
Interface Guide.
When users upload a new file, the default local volume destination for the file is
determined by the volume attributes of either the user or the user’s group. The
system determines the initial upload volume destination by working through the
following values, in order. The first value to have a valid volume is the destination
volume.
• The default local volume defined for the user
• The default local volume defined for the group under which the user is currently
logged on
• The default local volume defined for the user’s default group
• The default local volume defined for the parent group of:
o The default local volume defined for the group under which the user is
currently logged on.
o The default local volume defined for the user’s default group, if the previous
value is not set.
Note The TC_Store_and_Forward preference must be set to enable store and
forward functionality. If this preference is set, any of the users’ accessible
volumes can be defined as the session local volume using the Local Volume
box on the User Settings dialog box in the rich client or the thin client. The
session local volume setting overrides the default local volume setting.
If there are no default local volumes defined for the previous values, then store and
forward functionality is not used for the file. The normal upload volume location
is used. The system determines the volume destination by working through the
following values, in order. The first value to have a valid volume is the destination
volume.
• The default volume defined for the user
• The default volume defined for the group under which the user is currently
logged on
• The default volume set for the parent group of the group under which the user
is currently logged on
For more information about setting default local volumes, see the Organization
Guide.
4. Create the volumes you want to use as default local volumes in the Organization
application. Creating volumes in the Organization application adds the volumes
to the List of Defined Volumes.
For more information about creating volumes, see the Organization Guide.
After you create the volumes, the option to define a default local volume is
available while creating a new user, modifying an existing user, creating a new
group, and modifying an existing group.
For more information about creating users, see the Organization Guide.
You can also define a default local volume for a user by choosing Edit→User
Settings and selecting a default local volume from the Default Local Volume list.
4. Set the local volume for the user in the User Settings dialog box in the
Organization application.
e. After the translation is complete, verify that the files are moved to the
default volume.
Client
SYSTEMS SYSTEMS
WAN
Add a default local volume to an existing caching FSC using the Organization
application.
For more information about creating volumes, see the Organization Guide.
Client SYSTEMS
FSC 1 / WAN
Caching FSC
Client FSC 2 /
Caching FSC
Use the filestoregroup element in the fmsmaster.xml file to add a default local
volume, cross-mounted on two FSCs.
Side caching is performed only for the highest priority exits defined in the master
configuration file. For example, if three exits are defined, two set to priority 0 and
one set to priority 1, only the two exits with priority 0 are side cached.
The following graphic illustrates a caching configuration designed to support a large
number of users. In the example, on remote user uploads a file. Another remote
user requests a download of the same file. Without side caching configured, the file
is only cached after the initial download. With side caching enabled, after the file
is transferred to the final destination volume, it is automatically side cached to
the defined exit FSCs in the remote FSC group. In this example, the remote user
requesting the download receives the file from Exit FSC 2.
FSC Remote Group Cache on
side cache
SYSTEMS
Assigned FSC Corporate Server FSC Group
Uploading SYSTEMS
Client
Exit FSC 1 /
Caching FSC WAN
Side Caching
Note The transfer to the final destination volume may not occur immediately.
Until the transfer occurs, remote users requesting download of the file
receive it directly from the default local volume on their LAN.
The default local volume (also referred to as the store and forward volume) is a
real volume, storing production data. The production data is transferred to the
destination volume relatively soon (depending on the load, and how you have
configured the volume), but you must still consider upload requirements. The volume
must have the expected availability and reliability you require from a production
data volume. Siemens PLM Software recommends RAID 5 or better.
It is best to ensure that once a file is uploaded to the destination volume, any remote
requests for that file are retrieved from the cache, not the destination volume. Keep
in mind that once a file is transferred to the destination volume, any download
request for that file is delivered from the destination volume. If the request comes
from a remote user who has just uploaded the file, this represents a WAN hop,
producing the WAN penalty just avoided by using store and forward functionality.
Note Normal cache flushing and expiration rules apply to local default volume
files.
Volume failover
1. The list of resource elements includes volume, transientvolume, logvolume, and accesson.
is routed to the direct FSCs that serve it in order of the priority= attributes
of the direct FSC routes.
The priorities of direct FSC routes are determined by the priority=
attributes of the resource1 and filestoregroup elements of the fsc and
loadbalancer elements in the fmsmaster.xml file and delivered to the FCC
with the assignedfsc list on FCC initialization.
FMS uses client-proximity routing. Requests are routed by the first FSC to
receive a request for a resource that it can neither fulfill from cache nor serve
directly from volume. This initial FSC routes the request through the FMS
network to another FSC that serves the requested resource.
Warning It is very important that all FSC servers within the same FMS
system share identical fmsmaster.xml file information. If an FSC
server has an inaccurate configuration, it is prone to routing errors,
which can cause user transaction failure.
</fsc>
</fscgroup>
</fmsenterprise>
</fmsworld>
You can provide volume failover during file import by defining a failover volume for
importing files. If this behavior is configured, the system checks the target volume
before import. If the target volume is filled to a specified capacity, the file is directed
to a specified failover volume.
Volume failover during file import proceeds as follows:
1. A user initiates a file import. The targeted volume is determined by the default
volume specified for the user’s group. If store and forward functionality is
configured, the importing volume is the specified default local volume.
Note Default volumes and default local volumes are defined using the
Organization application. These settings are typically defined when
the user account is created.
Generally, default volumes are defined at the group level, not the
user level. Siemens PLM Software recommends that you do not
define a default volume for each user; such granular assignments are
time-consuming to maintain. When the user’s default volume is not
specified, the group’s default volume information is used.
2. The system searches for the cached value of the percent full of the targeted
volume.
• If a cached value is found, the value’s age is checked. If it exceeds the
time specified by the TC_Volume_Status_Resync_Interval preference, a
fresh value is requested by an FSC admin call. A new percent full value is
retrieved and cached.
The percent full values are cached to prevent excessive FSC requests. The
TC_Volume_Status_Resync_Interval preference specifies the minimum
amount of time that can pass before the percent-full value of a volume is
retrieved from an FSC.
• If a cached value is not found, the value is requested by a FSC admin call.
The percent-full value is retrieved and cached.
3. The system compares the percent-full value with the percent full specified by the
TC_Volume_Failover_Trigger preference.
• If the trigger point is not met, the system imports the file to the original
target volume.
• If the trigger point is met, the system imports the file to the failover volume
defined by the TC_Volume_Failover_Name preference.
The same behavior applies to default local volumes if store and forward functionality
is configured.
Volume data
You can move files from one volume to another using allocation rules. Use the
move_volume_files utility to retrieve an XML file containing the volume allocation
rules template, edit the rules as desired, and then use the utility to move the volume
files.
You can write volume allocation rules based on various dataset, item, item revision,
and volume criteria.
Example Consider a site using both CAD and JT files. Because JT files are volatile
and can be recovered from the CAD file if lost, they are on a different
backup schedule. The administrator decides to store all JT files in a
different volume than the CAD files.
Rules can be written in the XML file specifying different target volumes
for the JT and CAD files. Each time the utility is run, JT and CAD
files not already stored in the respective target volume are moved to
the appropriate destination.
2. Edit the volume allocation rules template to define volume allocation rules for
your site.
For an example, see Sample volume allocation rules XML file.
3. Evaluate the rules and store the results by running the move_volume_files
utility with the -rulesfile argument set to the name of the XML file and the
-f argument set to list. For example:
move_volume_files -u=infodba -p=infodba -g=dba -rulesfile=VolumeSelectionRules.xml —f=list
4. Evaluate the rules and move the specified files by running the
move_volume_files utility with the -rulesfile argument set to the name of the
XML file and the -f argument set to move. For example:
move_volume_files -u=infodba -p=infodba -g=dba -rulesfile=VolumeSelectionRules.xml —f=move
5. (Optional) Exclude specific volumes from all listing and transfer actions using
the -excludedvollist argument to process a file containing the list of volumes
to be excluded. This argument is typically used to list default local volumes
(store and forward volumes) to ensure the files stored in these temporary volume
locations are not transferred.
Use either the full path to the file, or use the partial path/file name, in which
case the utility searches for the file name in the current directory.
Any number of volumes can be specified in this file. Each entry must be a valid
volume name, listed on its own row in the file.
You can run this utility as a cron job or as a scheduled task, using
process_move_file_volumes as a .sh or .bat script, respectively.
For more information about using this utility, see the Utilities Reference.
Edit the rules template to define volume allocation rules for your site. For example:
<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE VolumeReallocationInfo SYSTEM "volumereallocation.dtd">
<volumereallocation>
<!-- Volume Reallocation Rules -->
<reallocationrule id="VM_0" destination="DV">
<usercriteria name="id" value="infodba" />
<usercriteria name="group" eqvalue="dba" />
<usercriteria name="role" nevalue="Designer" />
<usercriteria name="project" value="11234556" />
<volumecriteria name="availablespace" value="10000000" />
</reallocationrule>
<reallocationrule id="VM_1" destination="vol1">
<itemcriteria name="id" value="ABC" />
<itemcriteria name="project" value="11234556" />
<datasetcriteria name="type" value="UGMaster" />
</reallocationrule>
<reallocationrule id="rule2" destination="volume1">
Read/write tickets may not be honored during the move operation. This has a
significant impact on a production system. To move a volume within an enterprise
with minimum impact:
1. Use the backup_modes utility to put Teamcenter in read-only mode. For
example:
backup_modes -m=rdonly -u=infodba -p=password -g=dba
2. Use your operating system copy tools to copy the entire volume directory across
a LAN or WAN from its source location in FSC A to its destination location in
FSC B.
3. Use the fscadmin utility (stored in FMS_HOME) to retrieve the FMS master
configuration of FSC A. Make a note of the volume UID and the enterprise ID of
FSC A. For example:
fscadmin –s http://FSCA_address:port ./config
4. Use the fscadmin utility to remove the volume UID from the FMS master
configuration file for FSC A. For example.
fscadmin –s http://FSCA_address:port ./config/removevolume/nvargs/
volumeid=volume-UID;enterpriseid=site-ID;fmsconfigentryonly=1
5. Use the fscadmin utility to add the destination location and volume UID to the
FMS master configuration file of FSC B using one of the following identifiers:
• Using FSC ID. For example, type the following all on one line:
fscadmin –s http://FSCB_address:port ./config/newaddvolume/nvargs/
root=destination-location;volumeid=volume-UID;
fscid=FSC-B;enterpriseid=site-ID
• Using the file store group. For example, type the following all on one line:
fscadmin –s http://FSCB_address:port ./config/newaddvolume/nvargs/
root=destination-location;volumeid=volume-UID;
filestoregroupid=Group;enterpriseid=site-ID
• Using the load balancer ID. For example, type the following all on one line:
fscadmin –s http://FSCB_address:port ./config/newaddvolume/nvargs/
root=destination-location;volumeid=volume-UID;
loadbalancerid=load-balancer;enterpriseid=site-ID
6. Using your operating system tools, delete the volume under FSC A.
Element Location
parentfsc The fcc.xml file.
assignedfsc Within the clientmap elements in the fmsmaster.xml file.
fscmaster The fsc.xml file.
entryfsc Within the fscgroup elements in the fmsmaster.xml file.
Element Location
exitfsc Within the fscgroup elements in the fmsmaster.xml file.
Within the multisiteimport elements within the
defaultfsc
fmsenterprise elements.
Within the filestoregroup and fsc elements in the
volume
fmsmaster.xml file.
Within the filestoregroup and fsc elements in the
transientvolume
fmsmaster.xml file.
Within the filestoregroup and fsc elements in the
logvolume
fmsmaster.xml file.
In the following example, if the master configuration file contains the following
elements, the FCC directs requests for data on the volume vol1 approximately
equally among FMS servers fsc1 and fsc2.
Tip Legacy FCCs (configured prior to Teamcenter Engineering Process
Management 2005 SR1 MP2) cannot implement software load balancing.
However a partial load balancing is applied to legacy FCC clients. This
is provided by the FSC, which randomizes the FSC order for the equal
priorities each FCC configuration download. This effectively assigns
various FCC clients randomly to the equal priority FSCs, although each
legacy FCC client still uses the list in failover order. (Legacy FCCs
require all priorities to be unique.)
<filestoregroup id="fsgroup1">
<volume id="vol1" root="/data/vol1"/>
</filestoregroup>
<fsc id="fsc1" address=“http://fsc1:4444">
<filestore groupid=”fsgroup1” priority="0"/>
</fsc>
<fsc id="fsc2" address=“http://fsc2:4444">
<filestore groupid=”fsgroup1 priority="0"”/>
</fsc>
• Entry FSCs
The entryfsc attribute within the fscgroup element of the master configuration
file defines which of the FSCs in the FSC group are preferred for access from
outside the FSC group. An FSC randomly selects from among elements of equal
priority.
In the following example, the presence of the following elements cause requests
coming from other FSC groups to be sent to router1 and router2 each
approximately half of the time:
<entryfsc fscid=”router1” priority="1"/>
<entryfsc fscid=”router2” priority="1"/>
FSCs within the scope of the specified load balancer serve all resources declared in
the loadbalancer element, and perform the routing behaviors (entryfsc, exitfsc,
assignedfsc) attributed to the load balancer. This prevents FSCs within the scope
of a load balancer from forwarding requests back to the load balancer.
To clients and FSCs not within the scope of the specified load balancer, the load
balancer appears as a single FSC which serves all of the balanced resources and
exhibits the load balancer’s routing behaviors. Direct FSC routing, intergroup
routing, and intragroup routing all function on this basis. Thus clients request the
balanced resources only from the load balancer.
Note The loadbalancer XML element is similar to the fsc XML element. The
significant difference is that this element can not be used as the ID of
the FSC element in a local FSC configuration file. This is because the
loadbalancer XML element must always represent external hardware,
never an actual FSC.
This element can only be used in the master configuration file (fmsmaster.xml).
You can use the loadbalancer ID as a value for any of the following attributes
within the FSC group in which it is declared:
entryfsc fscid
exitfsc fscid
assignedfsc fscid
fsc loadbalancerid
The loadbalancer element can contain any of the following child elements:
• connection
• fccdefaults
• fscdefaults
• filestore
Load balancers support health checking for their servers. Health checking is
generally configured to use a particular URL within the back-end servers.
Because FSC servers support few requests that do not require tickets, many default
health checks return HTTP 400 errors that load balancers may interpret to mean
service is unavailable. To avoid these errors, Siemens PLM Software recommends
using HTTP HEAD or GET requests for /Ping or /favicon.ico resources. These
requests return an HTTP 200 status and verify the FSC is alive.
For WebSEAL, this configuration is controlled using the ping-uri configuration
element, documented in the WebSEAL product documentation.
and FSC2. These two FSCs share equal responsibility for providing volume data
access to the clients.
FSC Group 1
Load
Balancer
SYSTEMS SYSTEMS
Vol1
FCC Cache
FSC1
FCC Cache
SYSTEMS
Vol2
SYSTEMS
FCC Cache
FSC FSC2
Configuration Vol3
FCC Cache Server
Load
Balancer
SYSTEMS SYSTEMS
Vol1
FCC Cache
FSC1
FCC Cache
SYSTEMS
Vol2
SYSTEMS
FCC Cache
FSC FSC2
Concentrator Vol3
FCC Cache
When using the subnet/mask method, you can create a default client map by setting
the mask attribute value to 0.0.0.0. This creates a client map that matched all FCC
addresses, for example:
<clientmap subnet=”127.0.0.1” mask=”0.0.0.0”>
<assignedfsc fscid="fsc_engC" priority="0"/>
</clientmap>
The prefix length specifies how many leftmost bits of the address specify the prefix.
This is an alternate way of using the subnet and mask attributes in a clientmap
element.
For more information, see Using subnet/mask attributes in a client map.
The prefix length masks a requesting FCC IP address and then compares the results
with the prefix of the IP address to determine whether the requesting FCC address
is assigned to a particular client map. The client map must contain a set of FSCs
to be assigned to FSC clients.
Note The maximum prefix length is 32 for IPv4 addresses and 128 for IPv6
addresses.
• The following example illustrates a default client map using the CIDR method
with an IPv4 address:
<clientmap cidr=”216.068.063.000/24”>
<assignedfsc fscid="fsc_engC" priority="0"/>
</clientmap>
• The following example illustrates a client map using the CIDR method with
an IPv6 address:
<clientmap cidr=”fe80::7a5c:6199:766a:812e/64”>
<assignedfsc fscid="fsc_engC" priority="0"/>
</clientmap>
When using the CIDR method, you can create a default client map by setting the
address and prefix length to zeroes.
• The following example illustrates a default client map using the CIDR method
with an IPv4 address:
<clientmap cidr=”0.0.0.0/0”>
<assignedfsc fscid="fsc_engC" priority="0"/>
</clientmap>
• The following example illustrates a default client map using the CIDR method
with an IPv6 address:
<clientmap cidr=”0::0/0”>
<assignedfsc fscid="fsc_engC" priority="0"/>
</clientmap>
Domain name client maps allow you to administer client map functionality based on
domain name servers. There are four DNS-based client map attributes. Only one of
the attributes can be specified per client map element.
Attribute Use
dnszone Assigns all the FCCs within the specified DNS zone to an
FSC or set of FSCs, for example:
<clientmap dnszone="engA.company.com">
<assignedfsc fscid="fsc_engA" priority="0"/>
</clientmap>
Attribute Use
default Defines the FSCs to be assigned when no other client map
matches the FCC address. This default client map applies
to both subnet/mask and domain name client map matches.
If the default is not defined and the client map match fails,
then the FCC assignment fails, for example:
<clientmap default="true">
<assignedfsc fscid="fsc_engC" priority="0"/>
</clientmap>
dns_not_defined Use this attribute if you expect a reverse DNS lookup for
an FCCs domain name address cannot be performed. (For
example, if it is an unregistered address.) If this attribute
is not defined and the reverse DNS lookup fails then FCC
assignment fails, for example:
<clientmap dns_not_defined="true">
<assignedfsc fscid="fsc_engC" priority="0"/>
</clientmap>
Whenever an FCC requests its assigned FSCs from the FSC, the system performs
the following actions in the following order:
2. If there is no subnet/mask IP match and there are no domain name client maps
defined:
• If the default IP client map was configured, its assigned FSCs are returned.
• If the reverse DNS lookup succeeds, the domain name client maps are
searched for a match. If one is found, its assigned FSCs are returned.
4. If no domain name client map match is found and the default attribute is
defined, its assigned FSCs are returned.
Domain name client maps are sorted based on the length of the string in
their dnszone or dnshostname attributes. In the following example, the
support.ugs.com dnszone is the most specific so it is sorted first in the domain
name client map list. The com dnszone is the least specific client map and is sorted
last.
dnszone=”support.ugs.com”
dnszone=”ugs.com”
dnszone=”com”
Implement this functionality by configuring the FCC’s local fcc.xml file or the master
configuration file (fmsmaster.xml) at the primary site to provide the configuration
data required so the FCC can determine from which FSCs to request additional site
data. The FCC receives this configuration data upon startup when it loads data from
the fcc.xml file and downloads configuration data from the fmsmaster.xml file. Do
this by modifying the fcc.xml file or fmsmaster.xml file to configure your FCCs
to route each FMS request to a different FSC (or set of FSCs) based on the SiteID
contained in each request ticket. Each FCC will continue to have one or more default
FSC destination to which it routes requests associated with unknown SiteIDs.
For more information about configuring the FMS files, see example configurations in
fmsmaster.xml configuration example.
To implement this functionality:
• Each database must have a unique SiteID.
• Each database may be assigned its own security key to prevent unauthorized
access from other PLM systems. Each competitor’s PLM data should be
controlled by a separate database.
• FSC servers for all databases must be online, properly configured, of the proper
version, and functional.
</fsc>
…
</fscgroup>
</fmsenterprise>
</fmsworld>
traffic. File compression is available for FSC to FSC transfers across groups and
across sites.
File compression is controlled with two fscdefault elements
(FSC_DoNotCompressExtensions and FSC_WebRaidThreshold)
and the compression attribute, available in the defaultfsc and linkparameters
elements.
To configure file compression for multisite transfer:
1. Specify the file extensions you do not want compressed by adding the extension
names to the FSC_DoNotCompressExtensions element, located within the
fscdefault element in the fmsmaster.xml file.
Enter values as a comma-separated list. FSCs do not send these file types as
compressed files, nor request compressed content for these file types.
The default value for this element is:
<property-name="FSC_DoNotCompressExtensions"
value="bz,bz2,cab,deb,docm,docx,ear,gif,gz,jar,jpeg,jpg,jt,lha,lzh,lzo,mp3,
mp4,mpg,rar,rpm,sit,taz,tgz,war,xlsm,xlsx,z,zip" overridable="true"/>
2. Specify the minimum file size threshold that must be reached before files are
compressed by setting the FSC_WebRaidThreshold element located within
the fscdefault element in the fmsmaster.xml file. Files smaller than this
value are not compressed.
This value also determines the threshold file size that must be reached before
WebRAID (WAN acceleration) is used. The default setting is 32 K.
This configuration causes FSCs acting as servers to compress content for all clients
that indicate they can accept gzip compressed responses. It allows all FSCs acting
as clients to request compressed content for whole file transfers across sites and
across groups.
The following table indicates the transport method used to transport files, based on
how you configure compression parameters, file type, and whether the file size is
greater than the threshold value set for the FSC_WebRaidThreshold element.
Priority 0
path (LAN)
afsc1 afsc2 xfsc1 xfsc2
(W y 2
)
AN
th rit
pa rio
P
avol1 avol2 Pr h (W
xvol1 xvol2
pa
io
rit AN
t
y
2 )
Priority 0
path (LAN)
bfsc1 bfsc2 yfsc1 yfsc2
Use the fscgroupimport XML element to define routes to a remote site based on
your local FSC group information. Within this XML element, use the defaultfsc
attribute to define the remote FSC address, ID, transport mode and priority for
the route.
In the following example code, fscgroupimport defines routes to FSCs in a remote
site for FSCs coming from a locally defined fscgroup.
<fmsworld>
<multisiteimport siteid="XYZ">
<defaultfscimport fscid="xfsc1" address="http://127.100.0.1:5101" priority="0"/>
<defaultfscimport fscid="yfsc1" address="http://127.100.0.1:5102" priority="1"/>
<fscgroupimport groupid="US_group_A">
<!-- only address or fscid is needed not both -->
<!-- defaultfsc [ address="http://127.100.0.1:5101" | fscid=”xfsc1" ] priority="0"/ -->
<defaultfsc address="http://127.100.0.1:5101" priority="0"/>
<defaultfsc fscid="yfsc1" priority="1" transport="wan" maxpipes="4"/>
</fscgroupimport>
<fscgroupimport groupid="EU_group_B">
<defaultfsc fscid="yfsc1" priority="0"/>
<defaultfsc fscid="xfsc1" priority="1" transport="wan" maxpipes="4"/>
</fscgroupimport>
</multisiteimport>
<fmsenterprise id="ABC">
<fscgroup id="US_group_A">
<fsc id="afsc1" address="http://127.0.0.1:4101">
<volume id="avol1" root="/avol1"/>
</fsc>
<fsc id="afsc2" address="http://127.0.0.1:4102">
<volume id="avol2" root="/avol2"/>
</fsc>
</fscgroup>
<fscgroup id="EU_group_B">
<fsc id="bfsc1" address="http://127.0.0.1:4201">
Multiple enterprises
share a common FMS
configuration.
Group 1 Group 2
SYSTEMS SYSTEMS SYSTEMS SYSTEMS
enterprises
FSC 31 FSC 32
volABC311 volABC321
volABC312 volDEF221
In the following example code, additional sites are added to the configuration using
the fmsenterprise element (DEF and XYZ):
<fmsworld>
<fmsenterprise id="ABC" >
<fmsenterprise id="DEF"/>
<fmsenterprise id="XYZ"/>
<fscgroup id="group1">
<fsc id="fsc11" address="http://fsc11:4544">
<volume id="volABD111" root="c:/volumes/volABD111"/>
FMS monitoring
For File Management System (FMS) events, you can configure the following metrics
to provide specified levels of monitoring of specified events levels. Optionally, you
can receive e-mail notification when specified metrics cross specified thresholds.
Metric Description
Quarantined Dead Link A link between two resources in the FSC
network topology was quarantined.
All Routes Failed All routes to resources in the FMS topology
are inaccessible.
No Route Error A client or FCC is connector to the wrong
FSC server process.
Remote Admin Not Supported The Fms_BootStrap_Urls value is
incorrect.
Memory Collection Threshold The Java virtual machine has detected
Exceeded that the memory usage of a memory pool is
exceeding the collection usage threshold.
Memory Usage Threshold The Java virtual machine detects that the
Exceeded memory usage of a memory pool is exceeding
the usage threshold.
Generic Error The FSC server threw a general error.
Invalid Ticket The FSC server encountered a invalid ticket.
Metric Description
Expired Ticket The FSC Server encountered a expired
ticket.
Periodic Checks The periodic FSC network, local volume,
performance, and configuration checks has
detected an issue.
• FSCID
• Message
• Log
• Message
• Possible causes
• Recommended actions
The MLD holder is used for the All Routes Failed metric and the alert notification
trigger is a single event occurrence. The countable MLD holder is used for all other
metrics and the alert notification is triggered when the number of events is greater
than threshold values in a specified time period.
The FSC_Critical_Events Monitoring_Summary MBean consolidates
the event metrics and their corresponding values of the FSC process
for display in one screen of the J2EE administrative interface. The
FSC_Critical_Events_Monitoring_Configuration MBean contains the
Health_monitoring_mode attribute that you use to enable or disable the
monitoring system. The FSCHealthDiagnostics MBean performs periodic health
checks and critical event reasoning.
Configure FMS monitoring using either:
• The TC_ROOT/fsc/fscMonitorConfig.xml file.
For more information about using the XML file, see Configure monitoring with
the fscMonitoringConfig.xml file.
Tip You should review all monitoring settings, ensuring the thresholds are set
correctly for your site.
If you do not know the optimum monitoring setting for any given critical
event, set the value to COLLECT. Collect the data and review to determine
normal activity levels. Then set notification values slightly higher than
normal activity levels.
Tip The contents of the e-mail notifications are generated from the
TC_ROOT/fsc/monitoring/fscMonitorConfigInfo.xml file. (This is a
companion file to the fscMonitorConfig.xml file.) For a complete list of
possible causes and recommended actions for server manager monitoring,
see this file.
• Disable_Alerts
Enables monitoring of all the metrics listed in the file, but disables all
notifications of critical events, regardless of individual notification settings
on any metric.
• Off
Disables monitoring of all the metrics listed in the file.
• EmailResponder id
Specify an identification for this e-mail responder. Multiple e-mail
responders can be configured, in which case, the identifiers must be unique.
• protocol
Specify the e-mail protocol by which notifications are sent. The only
supported protocol is SMTP.
• hostAddress
Specify the server host from which the e-mail notifications are sent. In
a Multi-Site environment, the host address identifies the location of the
critical events.
• fromAddress
Specify the address from which the notification e-mails are sent.
• toAddress
Specify the address to which the notification e-mails are sent.
• suppressionPeriod
Specify the amount of time (in seconds ) to suppress e-mail notification of
critical events.
For more information, see the suppression period example in Introduction to
monitoring.
• emailFormat
Specify the format in which the e-mail is delivered. Valid values are html
and text.
• LoggerResponder id
Specify an identification for this logger responder. Multiple logger responders
can be configured, in which case, the identifiers must be unique.
• logFileName
Specify the name of the file to which critical events are logged.
• suppressionPeriod
Specify the amount of time (in seconds) to suppress logging of critical events
to the log file.
For more information, see the suppression period example in Introduction to
monitoring.
5. Configure the criteria for a critical event for any of the metrics in the file by:
a. Specifying a particular EmailResponder, if desired.
• Alert
Collect metric data, display results in the MBean view for this metric,
and send e-mail notifications when critical events occur.
• Off
No metric data is collected.
d. Setting the remaining values to specify criteria that must be met to initiate
a critical event for the metric.
</Responders>
</Metric>
- <Metric name="Memory Collection Threshold Exceeded" id="MemoryCollection" maxEntries="100"
mode="Collect" metricType="integer" description="Java virtual machine detects that the memory usage
of a memory pool is exceeding collection usage threshold.">
- <ThresholdWithPeriod>
<ThresholdValue name="NumberOfMemoryCollection" value="1" description="If memory collection
exceeds this limit, notify the administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="6000" description="Periods for which timeouts
will be monitored." />
</ThresholdWithPeriod>
- <Responders>
<ResponderRef id="EmailResponder1" />
<ResponderRef id="LoggerResponder1" />
</Responders>
</Metric>
- <Metric name="Memory Usage Threshold Exceeded" id="MemoryUsage" maxEntries="100" mode="Collect"
metricType="integer" description="Java virtual machine detects that the memory usage of a memory
pool is exceeding usage threshold.">
- <ThresholdWithPeriod>
<ThresholdValue name="NumberOfMemoryUsage" value="1" description="If memory collection exceeds
this limit, notify the administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="6000" description="Periods for which timeouts
will be monitored." />
</ThresholdWithPeriod>
- <Responders>
<ResponderRef id="EmailResponder1" />
<ResponderRef id="LoggerResponder1" />
</Responders>
</Metric>
- <Metric name="Generic Error" id="GenericError" maxEntries="100" mode="Collect" metricType="integer"
description="A general error was thrown from FSC Server.">
- <ThresholdWithPeriod>
<ThresholdValue name="NumberOfGenericError" value="10" description="If number of timeouts exceeds
this limit, notify the administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="6000" description="Periods for which timeouts
will be monitored." />
</ThresholdWithPeriod>
- <Responders>
<ResponderRef id="EmailResponder1" />
<ResponderRef id="LoggerResponder1" />
</Responders>
</Metric>
- <Metric name="Expired Ticket" id="ExpiredTicket" maxEntries="100" mode="Collect" metricType="integer"
description="FSC Server encountered a expired ticket.">
- <ThresholdWithPeriod>
<ThresholdValue name="NumberOfExpiredTicket" value="2" description="If number of timeouts exceeds
this limit, notify the administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="6000" description="Periods for which timeouts
will be monitored." />
</ThresholdWithPeriod>
- <Responders>
<ResponderRef id="EmailResponder1" />
<ResponderRef id="LoggerResponder1" />
</Responders>
</Metric>
- <Metric name="Invalid Ticket" id="InvalidTicket" maxEntries="100" mode="Collect"
metricType="integer" description="FSC Server encountered a invalid ticket.">
- <ThresholdWithPeriod>
<ThresholdValue name="NumberOfInvalidTicket" value="1" description="If number of timeouts exceeds
this limit, notify the administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="6000" description="Periods for which timeouts
will be monitored." />
</ThresholdWithPeriod>
- <Responders>
<ResponderRef id="EmailResponder1" />
<ResponderRef id="LoggerResponder1" />
</Responders>
</Metric>
- <Metric name="Periodic Checks" id="PeriodicChecks" maxEntries="100" mode="Collect"
metricType="integer" description="Periodic FSC Server health checks has detected an issue.">
- <ThresholdWithPeriod>
<ThresholdValue name="NumberOfPeriodicChecks" value="2" description="If number of timeouts exceeds
this limit, notify the administrator." />
<ThresholdPeriod name="TimePeriodInSec" value="6000" description="Periods for which timeouts
will be monitored." />
</ThresholdWithPeriod>
- <Responders>
<ResponderRef id="EmailResponder1" />
<ResponderRef id="LoggerResponder1" />
</Responders>
</Metric>
</MetricsConfig>
</ApplicationConfig>
• Disable_Alerts
Enables monitoring of all the metrics listed in the file, but disables all
notifications of critical events, regardless of individual notification settings
on any metric.
• Off
Disables monitoring of all the metrics listed in the file.
• From_address
Specify the address from which the notification e-mails are sent.
• Host_address
Specify the server host from which the e-mail notifications are sent. In
a Multi-Site environment, the host address identifies the location of the
critical events.
• Suppression_period
Specify the amount of time (in seconds) to suppress e-mail notification of
critical events.
For more information, see the suppression period example in Introduction to
monitoring.
• To_address
Specify the address to which the notification e-mails are sent. You can
specify multiple e-mail addresses, separated by commas.
5. Click Apply.
• Log_filename
Specify the name of the file to which critical events are logged.
• Suppression_period
Specify the amount of time (in minutes) to suppress logging of critical events
to the log file.
For more information, see the suppression period example in Introduction to
monitoring.
9. Click Apply.
2. Locate the RunHtmlAdapter key entry and set its value to true.
3. Add the following elements to the file following the RunHtmlAdapter setting:
<entry key="HtmlServerLogin" value="plmmonitor" />
<entry key="HtmlServerPassword" value="localhost" />
9. Log on using the default user name and password plmmonitor and localhost,
respectively.
The Web application metrics appear.
10. Click any of the links for the listed metric MBean.
2. Run the load_fsccache utility to target the fsc_ids within the PLM XML file
and prepopulate the cache. For example:
load_fsccache –u=infodba –p=infodba –g=dba –f=load -fsctargets=fsc-ID
–plmxml=abc.xml -log_types=ALL –log_filename=c:\temp\load.out
FSC Group 1
Vol 3
FCC Cache
• FSC roles
The single FSC in this diagram fulfills the volume server and configuration
server roles. The FSC does not provide file caching, as it has direct access to
all the volumes. It also does not provide transient volumes as this function is
performed by the FCC in two-tier mode.
• FCC roles
The FCC provides file caching (as always in both two-tier and four-tier
configurations). It also provides a transient volume so that clients need not be
aware of two-tier or four-tier operation.
• Client configuration
All clients are configured to retrieve the initial bootstrap configuration
information from FSC1, which assigns all clients to FSC1 for file access.
fmsenterprise element
This statement contains a definition of FSC defaults, FCC defaults, FSC1
and its assigned volumes. This statement also includes an ID attribute
which must match the unique identifier for the database.
fscdefaults
Specifies where the FSC read and write cache files are stored. These defaults
are used by any additional FSCs installed in the future.
fccdefaults
Specifies the default location of the user’s cache.
fscGroup
Defines the FSC group. All FSCs must belong to one, and only one, FSC
group.
fsc
Defines the FSC identifier and configures the FSC. The address of FSC1 is
146.122.40.99:4444. Dot notation is used in this example for simplicity. DNS
names may also be used, such as csun17.ugs.com:4444.
volume
Several volumes are defined for FSC1. Each volume must have an entry
under FSC1. The volume statements also specify the root directory for each
volume. The volumes can be either local disk volumes, or mounted volumes
on the network. While paths specified for the volume typically match the
traditional Teamcenter path for the volume for a small deployment, FSCs
can be installed on any box as needed and file paths may depend on mount
points provided on that box. Thus the path need not match the traditional
Teamcenter volume path.
You can use the backup_xml information program to generate the volume
IDs.
clientmap
Specifies that all clients on 146 prefixed network addresses are assigned
to FSC1.
A sample of the master configuration file for this configuration is:
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fmsmasterconfig.dtd">
<fmsworld>
<fmsenterprise id="fms.teamcenter.com">
<fscdefaults>
<property name="FSC_ReadCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
<property name=“FSC_WriteCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
</fscdefaults>
<fccdefaults>
<property name="FCC_CacheLocation"
value="$HOME/FCCCache|/tmp/$USER/FCCCache"
overridable="true"/>
</fccdefaults>
<fscGroup id="fscGroup1">
<fsc id="fsc1" address=“http://146.122.40.99:4444">
<volume id="vol1" root="//csun17/vol1"/>
<volume id="vol2" root="//csun17/vol2"/>
<volume id="vol3" root="//csun17/vol3"/>
</fsc>
<clientmap subnet="146.0.0.1" mask="255.0.0.0">
<assignedfsc fscid="fsc1"/>
</clientmap>
</fscGroup>
</fmsenterprise>
</fmsworld>
fscmaster
Specifies that the FSC reads the file directly from disk out of the FSC launch
(working) directory. Note that the file name may be specified in the launch
command as the fms.config property.
fsc
Specifies the FSC ID for this installed FSC. This FSC ID is used to refer to the
FSC definition provided in the FMS master configuration file. For example:
FSC1
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="true"/>
<fsc id="fsc1"/>
</fscconfig>
Assigned FSC
The assigned FSC is FSC1, as specified in the FMS master configuration file.
FSC Group 1
SYSTEMS
LAN
FCC Cache
FSC 1
SYSTEMS
FCC Cache
FSC 2
SYSTEMS
FCC Cache
FSC 3
assignedfsc
All users have an assigned FSC even though direct routing is enabled. In
this configuration, the assigned FSC is only used to determine the group and
the list of FSCs to which the client may directly connect. More complex
deployments described in later sections describe additional roles for the
assigned FSC.
<fccdefaults>
<property name="FCC_CacheLocation"
value="$HOME/FCCCache|/tmp/$USER/FCCCache"
overridable="true"/>
</fccdefaults>
<fscGroup id="fscGroup1">
<fsc id="fsc1" address=“http://csun17.ugs.com:4444">
<volume id="vol1"
root="/data/vol1"/>
</fsc>
<fsc id="fsc2" address=“http://csun18.ugs.com:4444">
<volume id="vol2"
root="/data/vol2"/>
</fsc>
<fsc id="fsc3" address=“http://csun19.ugs.com:4444">
<volume id="vol3"
root="/data/vol3"/>
</fsc>
<clientmap subnet="146.0.0.1" mask="255.0.0.0">
<assignedfsc fscid="fsc1"/>
</clientmap>
</fscGroup>
</fmsenterprise>
</fmsworld>
fmsmaster
Specifies that FSC1 is the master configuration server in the FSC1config file.
The FSC2 and FSC3 configuration files download the master configuration
file from FSC1.
SYSTEMS
FCC Cache
FSC 1
LAN
SYSTEMS SYSTEMS
FCC Cache
FSC Cache FSC 2
SYSTEMS
FCC Cache
FSC 3
FCC_EnableDirectFSCRouting
Set this configuration parameter to false to disable direct routing. This
causes all FCC data access to be provided by the FCC’s assigned FSC. If this
parameter is not set, the client FSCs directly access the FSC volume servers.
The FSC uses the default read/write partial cache configuration and sizes.
FSC cache
This configuration includes an FSC cache. This configuration also requires a
FSC configuration file.
SYSTEMS
LAN
FCC Cache
FSC 1
FCC Cache
FSC Remote Cache FSC Cache FSC 2
SYSTEMS
FCC Cache
FSC 3
Assigned FSC
Clients are assigned to the FSC remote cache server. This provides a local
shared cache for the remote user group. Direct routing is not required for the
FSC remote cache, since there are no volumes in the FSC remote group.
entryfsc
This parameter ensures that all incoming requests to FSC Group 1 are sent
to the FSC cache server. If the entry FSC is not specified, requests are sent
directly to the FSC volume servers.
FCC_EnableDirectFSCRouting
By default, this parameter is set to true. In this configuration, the value has
no effect, as there are no volumes in the FSC remote group.
Link parameters
WAN acceleration is enabled from the remote office to the central office using
the linkparameters fromgroup statement.
<linkparameters fromgroup=”fscRemoteGroup”
togroup=”fscGroup1”
transport=”wan” />
</fmsenterprise>
</fmsworld>
WAN Vol 1
FCC Cache FSC 1
SYSTEMS SYSTEMS
Vol 2
FCC Cache
FSC FSC 2
Cache
SYSTEMS
</fmsenterprise>
</fmsworld>
• The exit FSC routes the requests either to the outside group’s entry FSC (if
configured) or to an FSC that serves the requested resource. Outbound requests
are requests for data on a resource outside the group. Outbound requests
typically originate within the group, but this is not always the case.
• The exit FSC is primarily a cache server. Its purpose is to populate and serve
data originating outside the group from its cache whenever possible. The data
in its cache is high value. By serving the data from its cache, a WAN trip is
prevented.
• Maintain the high value of the data in the exit FSC cache by setting the
FSC_CachePolicy element to CacheIfNotInLocalFSCGroup. This prevents
the exit FSC from caching group data.
FCC_EnableDirectFSCRouting
The FCC_EnableDirectFSCRouting element is set to true. FCCs in each
FSC group route requests for locally served volumes directly to the FSCs
serving the volume. Therefore, local requests from rich clients are not routed
through the AssignedFSC or ExitFSC elements. Thin clients always route
all requests through the AssignedFSC element.
AssignedFSC
The AssignedFSC element for each group is ExitFSC. Therefore rich
clients route requests for data served outside the group to the exit FSC first.
Thin clients always route all requests through the assigned FSC.
FSC_Cache Policy
The FSC_CachePolicy element is set to CacheIfNotInLocalFSCGroup
in FSCGroup1 and FSCGroup2, preventing the FSC caches within the
groups from storing data served within the local FSC group. This setting
is particularly important for thin clients, which always route all requests
through the assigned FSC.
Link parameters
WAN acceleration is enabled from the remote office to the central office using
the linkparameters fromgroup element.
This FSC configuration file for this configuration has the same key points as
the FSC cached configuration.
FSCREMOTECACHE
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address="http://csun17.ugs.com:4444" />
<fsc id="fscRemoteExit"/>
</fscconfig>
FSCEXIT
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address="http://csun17.ugs.com:4444" />
<fsc id="fscExit"/>
</fscconfig>
FSC1
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="true" />
<fsc id="fsc1"/>
</fscconfig>
FSC2
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address="http://csun17.ugs.com:4444" />
<fsc id="fsc2"/>
</fscconfig>
…
FSC6
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address="http://csun17.ugs.com:4444" />
<fsc id="fsc6"/>
</fscconfig>
FSC Group 1
LAN SYSTEMS
FSC 1
Cache 1
SYSTEMS
Hot failover
Both of the FSC cache machines are caching files. Therefore, if one FSC
cache machine fails, the other takes up the additional traffic. There is
potential performance degradation.
Configuration failover
Two different FSCs are identified as configuration servers. This insures that
the FCC can initialize by downloading the configuration file in case one FSC
cache machine has failed or is taken down for maintenance.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fccconfig SYSTEM "fccconfig.dtd">
<fccconfig>
<parentfsc address=“http://csun17.ugs.com:4444" priority="0"/>
<parentfsc address=“http://csun18.ugs.com:4444" priority="1"/>
</fccconfig>
LAN SYSTEMS
FSC 1
Cache 1
SYSTEMS
</fscconfig>
FSC3
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address=“http://csun17.ugs.com:4444” priority=”0” />
<fscmaster serves="false" address=“http://csun18.ugs.com:4444” priority=”1” />
<fsc id="fsc3"/>
</fscconfig>
FscCache1
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address=“http://csun17.ugs.com:4444” priority=”0” />
<fscmaster serves="false" address=“http://csun18.ugs.com:4444” priority=”1” />
<fsc id="fscCache1"/>
</fscconfig>
FscCache2
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address=“http://csun17.ugs.com:4444” priority=”0” />
<fscmaster serves="false" address=“http://csun18.ugs.com:4444” priority=”1” />
<fsc id="fscCache2"/>
</fscconfig>
LAN SYSTEMS
FSC 1
Cache 1
SYSTEMS
<fscdefaults>
<property name="FSC_ReadCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
<property name=”FSC_WriteCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
</fscdefaults>
<fccdefaults>
<property name="FCC_CacheLocation"
value="$HOME/FCCCache|/tmp/$USER/FCCCache"
overridable="true"/>
<property name=”FCC_EnableDirectFSCRouting”
Value=”false”
Overridable=”false” />
</fccdefaults>
<fscGroup id="fscGroup1">
<fsc id=”fscCache1” address=“http://csun15.ugs.com:4444” />
<fsc id=”fscCache2” address=“http://csun16.ugs.com:4444” />
<fsc id="fsc1" address=“http://csun17.ugs.com:4444">
<volume id="vol1" root="/data/vol1"/>
</fsc>
<fsc id="fsc2" address=“http://csun18.ugs.com:4444">
<volume id="vol2" root="/data/vol2"/>
</fsc>
<fsc id="fsc3" address=“http://csun19.ugs.com:4444">
<volume id="vol3" root="/data/vol3"/>
</fsc>
<clientmap subnet="146.122.40.1" mask="255.255.255.0">
<assignedfsc fscid="fscCache1” priority=”0” />
<assignedfsc fscid="fscCache2” priority=”0” />
<assignedfsc fscid="fsc3” priority=”1” />
</clientmap>
<clientmap subnet="146.122.41.1" mask="255.255.255.0">
<assignedfsc fscid="fscCache1” priority=”0” />
<assignedfsc fscid="fscCache2” priority=”0” />
<assignedfsc fscid="fsc3” priority=”1” />
</clientmap>
</fscGroup>
</fmsenterprise>
</fmsworld>
This resource is
accessed equally
from volserver 1 and
volserver 2.
SYSTEMS SYSTEMS
data
volserver 1 nfs
SYSTEMS
The transient
Client volume is not
volserver 2 load balanced.
SYSTEMS
transient data
volserver 3
filestoregroup element
The filestoregroup element defines a volume (or group of volumes) to be
load balanced across several FSCs.
filestore element
The filestore element in an FSC definition, within an fscgroup, identifies
the filestore group to serve. The priority attribute defines its load balancing
priority.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fmsmasterconfig.dtd">
<fmsworld>
<fmsenterprise id="fms.teamcenter.com">
<fscdefaults>
<property name="FSC_ReadCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
<property name=”FSC_WriteCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
</fscdefaults>
<fccdefaults>
<property name="FCC_CacheLocation"
value="$HOME/FCCCache|/tmp/$USER/FCCCache"
overridable="true"/>
<property name=”FCC_EnableDirectFSCRouting”
Value=”false”
Overridable=”false” />
</fccdefaults>
<filestoregroup id="fsgroup1">
<volume id="data" root="/nfs/data"/>
</filestoregroup>
<fscGroup id="fscGroup1">
<fsc id="volserver1" address="http://fsc1:4444">
<filestore groupid="fsgroup1" priority="0"/>
</fsc>
<fsc id=" volserver2" address="http://fsc2:4444">
<filestore groupid="fsgroup1" priority="0"/>
</fsc>
<fsc id=" volserver3" address="http://fsc3:4444">
<transientvolume id="transientdata"
root="/PLM/volumes/transientdata"/>
</fsc>
<clientmap subnet="146.122.40.1" mask="255.255.255.0">
<assignedfsc fscid="volserver1” />
</clientmap>
<clientmap subnet="146.122.41.1" mask="255.255.255.0">
<assignedfsc fscid="fscCache1” />
</clientmap>
</fscGroup>
</fmsenterprise>
</fmsworld>
LAN SYSTEMS
Vol 1
FSC 1
Cache 1
SYSTEMS
<property name=”FCC_EnableDirectFSCRouting”
Value=”false”
Overridable=”false” />
</fccdefaults>
<fscGroup id="fscGroup1">
<fsc id=”fscCache1” address=“http://csun15.ugs.com:4444” />
<fsc id=”fscCache2” address=“http://csun16.ugs.com:4444” />
<fsc id="fsc1" address=“http://csun17.ugs.com:4444">
<volume id="vol1" root="/data/vol1"/ priority=”0”>
<volume id="vol2" root="/data/vol2"/ priority=”1”>
</fsc>
<fsc id="fsc2" address=“http://csun18.ugs.com:4444">
<volume id="vol2" root="/data/vol2"/ priority=”0”>
<volume id="vol3" root="/data/vol3"/ priority=”1”>
</fsc>
<fsc id="fsc3" address=“http://csun19.ugs.com:4444">
<volume id="vol3" root="/data/vol3"/ priority=”0”>
<volume id="vol1" root="/data/vol1"/ priority=”1”>
</fsc>
<clientmap subnet="146.122.40.1" mask="255.255.255.0">
<assignedfsc fscid="fscCache1” priority=”0” />
<assignedfsc fscid="fscCache2” priority=”1” />
</clientmap>
<clientmap subnet="146.122.41.1" mask="255.255.255.0">
<assignedfsc fscid="fscCache2” priority=”0” />
<assignedfsc fscid="fscCache1” priority=”1” />
</clientmap>
</fscGroup>
</fmsenterprise>
</fmsworld>
LAN
SYSTEMS
FSC 1
Cache 1 Cache 1
SYSTEMS
Cold failover
All requests from the FSC remote group go through the FSC Cache 1
machine. The FSC Cache 2 machine is idle until there is a failure, in which
case the FSC remote cache machines fail to FSC Cache 2. FSC Cache 2 can
be assigned local LAN access to utilize this spare capacity.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fmsmasterconfig.dtd">
<fmsworld>
<fmsenterprise id="fms.teamcenter.com">
<fscdefaults>
<property name="FSC_ReadCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
<property name=”FSC_WriteCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
</fscdefaults>
<fccdefaults>
<property name="FCC_CacheLocation"
value="$HOME/FCCCache|/tmp/$USER/FCCCache"
overridable="true"/>
<property name=”FCC_EnableDirectFSCRouting”
Value=”false”
Overridable=”false” />
</fccdefaults>
<fscGroup id="fscRemoteGroup">
<fsc id=”fscRemoteCache1”
address=“http://rsun1.ugs.com:4444” />
<fsc id=”fscRemoteCache2”
address=“http://rsun2.ugs.com:4444” />
<clientmap subnet="146.122.40.1"
mask="255.255.255.0">
<assignedfsc fscid="fscCache1” priority=”0” />
<assignedfsc fscid="fscCache2” priority=”1” />
</clientmap>
<clientmap subnet="146.122.41.1"
mask="255.255.255.0">
<assignedfsc fscid="fscCache2” priority=”0” />
<assignedfsc fscid="fscCache1” priority=”1” />
</clientmap>
</fscGroup>
<fscGroup id="fscGroup1">
<fsc id=”fscCache1” address=“http://csun15.ugs.com:4444” />
<fsc id=”fscCache2” address=“http://csun16.ugs.com:4444” />
<fsc id="fsc1" address=“http://csun17.ugs.com:4444">
<volume id="vol1" root="/data/vol1"/>
</fsc>
<fsc id="fsc2" address=“http://csun18.ugs.com:4444">
<volume id="vol2" root="/data/vol2"/>
</fsc>
<fsc id="fsc3" address=“http://csun19.ugs.com:4444">
<volume id="vol3" root="/data/vol3"/>
</fsc>
<entryfsc fscid=”fscache1” priority=”0” />
<entryfsc fscid=”fscache2” priority=”1” />
</fscGroup>
<linkparameters fromgroup=”fscRemoteGroup”
togroup=”fscGroup1”
transport=”wan”>
</fmsenterprise>
</fmsworld>
FSC Remote
LAN Cache 1
SYSTEMS
FSC Group 1
SYSTEMS
FSC 1
WAN Cache 1
SYSTEMS
FCC failover
When the FSC remote Cache 1 machine fails, all remote users’ FCCs failover
to FSC Cache1. If that machine also fails, all remote users fail over to FSC
Cache 2. As a result, FSC Cache 2 is normally an idle machine.
the FCCs receive the configuration download data from the FSC Cache 2
machine.
entryfsc
This parameter specifies the routing during normal operations when file
requests flow through the FSC Remote Group during normal operations. If
the remote cache fails, these statements have no effect. When the remote
cache fails, users are assigned FSC Cache 1 or FSC Cache 2, according to
the client masks.
FCC_EnableDirectFSCRouting
This parameter does not need to be set; there is only one FSC in the FSC
Remote group, which is the primary group for all users. This parameter
applies only to the primary assigned group, it does not apply to secondary
groups if the remote cache server fails. Thus, this parameter setting has no
impact on this configuration.
WAN settings
During normal operations, traffic between the groups is based on the link
parameters which specify WAN acceleration. During failover operations
the assigned FSCs in the masks specify that the FCC should use WAN
acceleration for access to the FSC Group 1 cache servers.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fmsmasterconfig.dtd">
<fmsworld>
<fmsenterprise id="fms.teamcenter.com">
<fscdefaults>
<property name="FSC_ReadCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
<property name=”FSC_WriteCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
</fscdefaults>
<fccdefaults>
<property name="FCC_CacheLocation"
value="$HOME/FCCCache|/tmp/$USER/FCCCache"
overridable="true"/>
</fccdefaults>
<fscGroup id="fscRemoteGroup">
<fsc id=”fscRemoteCache1”
address=“http://rsun1.ugs.com:4444” />
<clientmap subnet="146.122.40.1"
mask="255.255.255.0">
<assignedfsc fscid="fscRemoteCache1”
priority=”0” />
<assignedfsc fscid="fscCache1”
transport=”wan”
priority=”1” />
<assignedfsc fscid="fscCache2”
transport=”wan”
priority=”2” />
</clientmap>
<clientmap subnet="146.122.41.1"
mask="255.255.255.0">
<assignedfsc fscid="fscRemoteCache1”
priority=”0” />
<assignedfsc fscid="fscCache2”
transport=”wan”
priority=”1” />
<assignedfsc fscid="fscCache1”
transport=”wan”
priority=”2” />
</clientmap>
</fscGroup>
<fscGroup id="fscGroup1">
<fsc id=”fscCache1” address=“http://csun15.ugs.com:4444” />
<fsc id=”fscCache2” address=“http://csun16.ugs.com:4444” />
<fsc id="fsc1" address=“http://csun17.ugs.com:4444">
<volume id="vol1" root="/data/vol1"/>
</fsc>
</fscconfig>
FSC Remote
SYSTEMS
Cache 1
FSC 1
FCC Cache SYSTEMS
FSC SYSTEMS
Cache 1
SYSTEMS
FCC Cache FSC Remote
Cache 6
Both of the FSC remote cache machines are caching files. Therefore, if one
fails, the other machine takes up the additional traffic. There is potential
performance degradation.
Cold failover
All requests from the FSC remote group go through the FSC Cache 1
machine. The FSC Cache 2 machine is idle until there is a failure, in which
case the FSC remote cache machines fail to FSC Cache 2. FSC Cache 2 can
be assigned local LAN access to utilize this spare capacity.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fmsmasterconfig.dtd">
<fmsworld>
<fmsenterprise id="fms.teamcenter.com">
<fscdefaults>
<property name="FSC_ReadCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
<property name=”FSC_WriteCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
</fscdefaults>
<fccdefaults>
<property name="FCC_CacheLocation"
value="$HOME/FCCCache|/tmp/$USER/FCCCache"
overridable="true"/>
</fccdefaults>
<fscGroup id="fscRemoteGroup1">
<fsc id=”fscRemoteCache1”
address=“http://rsun1.ugs.com:4444” />
<fsc id=”fscCache2”
address=“http://rsun2.ugs.com:4444” />
<clientmap subnet="146.122.40.1"
mask="255.255.255.0">
<assignedfsc fscid="fscRemoteCache1” priority=”0” />
<assignedfsc fscid="fscRemoteCache2” priority=”1” />
</clientmap>
<clientmap subnet="146.122.41.1"
mask="255.255.255.0">
<assignedfsc fscid="fscRemoteCache2” priority=”0” />
<assignedfsc fscid="fscRemoteCache1” priority=”1” />
</clientmap>
<grouproute destination=”fscGroup1”>
<routethrough groups=”fscRemoteGroup3”
priority=”0” />
<routethrough groups=””
priority=”1” />
</grouproute>
</fscGroup>
<fscGroup id="fscRemoteGroup2">
<fsc id=”fscRemoteCache1”
address=“http://rsun3.ugs.com:4444” />
<fsc id=”fscCache2”
address=“http://rsun4.ugs.com:4444” />
<clientmap subnet="146.122.42.1"
mask="255.255.255.0">
<assignedfsc fscid="fscRemoteCache3” priority=”0” />
<assignedfsc fscid= fscRemoteCache4” priority=”1” />
</clientmap>
<clientmap subnet="146.122.43.1"
mask="255.255.255.0">
<assignedfsc fscid="fscRemoteCache4” priority=”0” />
<assignedfsc fscid="fscRemoteCache3” priority=”1” />
</clientmap>
<grouproute destination=”fscGroup1”>
<routethrough groups=”fscRemoteGroup3”
priority=”0” />
<routethrough groups=””
priority=”1” />
</grouproute>
</fscGroup>
<fscGroup id="fscRemoteGroup3">
<fsc id=”fscRemoteCache5”
address=“http://rsun5.ugs.com:4444” />
<fsc id=”fscRemoteCache6”
address=“http://rsun6.ugs.com:4444” />
</fscGroup>
<fscGroup id="fscGroup1">
<fsc id=”fscCache1” address=“http://csun15.ugs.com:4444” />
<fsc id=”fscCache2” address=“http://csun16.ugs.com:4444” />
<fsc id="fsc1" address=“http://csun17.ugs.com:4444">
<volume id="vol1" root="/data/vol1"/>
</fsc>
<fsc id="fsc2" address=“http://csun18.ugs.com:4444">
<volume id="vol2" root="/data/vol2"/>
</fsc>
<fsc id="fsc3" address=“http://csun19.ugs.com:4444">
<volume id="vol3" root="/data/vol3"/>
</fsc>
<entryfsc fscid=”fscache1” priority=”0” />
<entryfsc fscid=”fscache2” priority=”1” />
</fscGroup>
<linkparameters fromgroup=”fscRemoteGroup1”
togroup=” fscGroup1”
transport=”wan”>
<linkparameters fromgroup=”fscRemoteGroup2”
togroup=” fscGroup1”
transport=”wan”>
<linkparameters fromgroup=”fscRemoteGroup3”
togroup=” fscGroup1”
transport=”wan”>
</fmsenterprise>
</fmsworld>
FSC Remote
SYSTEMS
Cache 1
FSC 1
FCC Cache SYSTEMS
FSC SYSTEMS
Cache 1
Group 4 Cache 2
FSC 3
SYSTEMS
FCC Cache FSC Remote
Cache 6
Cold failover
All requests from the FSC remote group go through the FSC Cache 1
machine. The FSC Cache 2 machine is idle until there is a failure, in which
case the FSC remote cache machines fail to FSC Cache 2. FSC Cache 2 can
be assigned local LAN access to utilize this spare capacity.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fmsmasterconfig.dtd">
<fmsworld>
<fmsenterprise id="fms.teamcenter.com">
<fscdefaults>
<property name="FSC_ReadCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
<property name=”FSC_WriteCacheLocation"
value="$HOME/FscCache|/tmp/FscCache"
overridable="true"/>
</fscdefaults>
<fccdefaults>
<property name="FCC_CacheLocation"
value="$HOME/FCCCache|/tmp/$USER/FCCCache"
overridable="true"/>
</fccdefaults>
<fscGroup id="fscRemoteGroup1">
<fsc id=”fscRemoteCache1”
address=“http://rsun1.ugs.com:4444” />
<fsc id=”fscCache2”
address=“http://rsun2.ugs.com:4444” />
<clientmap subnet="146.122.40.1"
mask="255.255.255.0">
<assignedfsc fscid="fscRemoteCache1” priority=”0” />
<assignedfsc fscid="fscRemoteCache2” priority=”1” />
</clientmap>
<clientmap subnet="146.122.41.1"
mask="255.255.255.0">
<assignedfsc fscid="fscRemoteCache2” priority=”0” />
<assignedfsc fscid="fscRemoteCache1” priority=”1” />
</clientmap>
<grouproute destination=”fscGroup1”>
<routethrough groups=”fscRemoteGroup3”
priority=”0” />
<routethrough groups=”fscRemoteGroup4”
priority=”1” />
</grouproute>
</fscGroup>
<fscGroup id="fscRemoteGroup2">
<fsc id=”fscRemoteCache1”
address=“http://rsun3.ugs.com:4444” />
<fsc id=”fscCache2”
address=“http://rsun4.ugs.com:4444” />
<clientmap subnet="146.122.42.1"
mask="255.255.255.0">
<assignedfsc fscid="fscRemoteCache3” priority=”0” />
<assignedfsc fscid= fscRemoteCache4” priority=”1” />
</clientmap>
<clientmap subnet="146.122.43.1"
mask="255.255.255.0">
<assignedfsc fscid="fscRemoteCache4” priority=”0” />
<assignedfsc fscid="fscRemoteCache3” priority=”1” />
</clientmap>
<grouproute destination=”fscGroup1”>
<routethrough groups=”fscRemoteGroup4”
priority=”0” />
<routethrough groups=”fscRemoteGroup3”
priority=”1” />
</grouproute>
</fscGroup>
<fscGroup id="fscRemoteGroup3">
<fsc id=”fscRemoteCache5”
address=“http://rsun5.ugs.com:4444” />
</fscGroup>
<fscGroup id="fscRemoteGroup4">
<fsc id=”fscRemoteCache6”
address=“http://rsun6.ugs.com:4444” />
</fscGroup>
<fscGroup id="fscGroup1">
<fsc id=”fscCache1” address=“http://csun15.ugs.com:4444” />
<fsc id=”fscCache2” address=“http://csun16.ugs.com:4444” />
<fsc id="fsc1" address=“http://csun17.ugs.com:4444">
<volume id="vol1" root="/data/vol1"/>
</fsc>
<fsc id="fsc2" address=“http://csun18.ugs.com:4444">
<volume id="vol2" root="/data/vol2"/>
</fsc>
<fsc id="fsc3" address=“http://csun19.ugs.com:4444">
<volume id="vol3" root="/data/vol3"/>
</fsc>
<entryfsc fscid=”fscache1” priority=”0” />
<entryfsc fscid=”fscache2” priority=”1” />
</fscGroup>
<linkparameters fromgroup=”fscRemoteGroup3”
togroup=”fscGroup”
transport=”wan”>
<linkparameters fromgroup=”fscRemoteGroup4”
togroup=”fscGroup”
transport=”wan”>
</fmsenterprise>
</fmsworld>
FSCRemoteCache1
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address=“http://csun15.ugs.com:4444” priority=”0” />
<fscmaster serves="false" address=“http://csun16.ugs.com:4444” priority=”1” />
<fsc id="fscRemoteCache1"/>
</fscconfig>
FSCRemoteCache2
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address=“http://csun15.ugs.com:4444” priority=”0” />
<fscmaster serves="false" address=“http://csun16.ugs.com:4444” priority=”1” />
<fsc id="fscRemoteCache2"/>
</fscconfig>
FSCRemoteCache3
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address=“http://rsun5.ugs.com:4444” priority=”0” />
<fscmaster serves="false" address=“http://rsun6.ugs.com:4444” priority=”1” />
<fsc id="fscRemoteCache3"/>
</fscconfig>
FSCRemoteCache4
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address=“http://rsun5.ugs.com:4444” priority=”0” />
<fscmaster serves="false" address=“http://rsun6.ugs.com:4444” priority=”1” />
<fsc id="fscRemoteCache4"/>
</fscconfig>
FSCRemoteCache5
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address=“http://csun15.ugs.com:4444” priority=”0” />
<fscmaster serves="false" address=“http://csun16.ugs.com:4444” priority=”1” />
<fsc id="fscRemoteCache5"/>
</fscconfig>
FSCRemoteCache6
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE fscconfig SYSTEM "fscconfig.dtd">
<fscconfig>
<fscmaster serves="false" address=“http://csun15.ugs.com:4444” priority=”0” />
<fscmaster serves="false" address=“http://csun16.ugs.com:4444” priority=”1” />
<fsc id="fscRemoteCache6"/>
</fscconfig>
Priority 0
path (LAN)
afsc1 afsc2 xfsc1 xfsc2
(W y 2
)
AN
th rit
pa rio
P
avol1 avol2 xvol1 xvol2
Pr h (W
pa
io
rit AN
t
y
2 )
Not all FSCs
or volumes
EU_group_B EU_group_Y need to be
known by
SYSTEMS SYSTEMS SYSTEMS SYSTEMS Enterprise
ABC.
Priority 0
path (LAN)
bfsc1 bfsc2 yfsc1 yfsc2
fscgroupimport element
The fscgroupimport element defines routes to FSCs in a remote site. This
element allows you to define routes to a remote site based on the originating
local fscgroup. The fscgroupimport contains defaultfsc elements, which
define the remote FSC address or ID, transport mode and priority for the
route. Using fscgroupimport elements, a site can express multisite routing
configurations without exposing their entire network topology. Only the
gateway FSCs in the remote site need be known by the local site.
defaultfsc element
The fscgroupimport elements contains defaultfsc elements, which can
define the remote FSC address or ID, transport mode and priority for the
route. Using this element, a site can define a route to a geographically close
FSC in the remote site which makes sense for the local site’s group.
The wan attribute allows you to direct remote traffic via the WAN transport
mode. Use this attribute to configure WAN routes between geographically
distant sites.
<fmsworld>
<multisiteimport siteid="XYZ">
<defaultfscimport fscid="xfsc1" fscaddress=”http://127.100.0.1:5101” priority="0" />
<defaultfscimport fscid="yfsc1" fscaddress=”http://127.100.0.1:5102” priority="1" />
<fscgroupimport groupid="US_group_A">
<defaultfsc address=http://127.100.0.1:5101 priority="0"/>
<defaultfsc fscid="yfsc1" priority="1" transport="wan"
maxpipes="4"/>
</fscgroupimport>
<fscgroupimport groupid="EU_group_B">
<defaultfsc fscid="yfsc1" priority="0"/>
<defaultfsc fscid="xfsc1" priority="1" transport="wan"
maxpipes="4"/>
</fscgroupimport>
</multisiteimport>
<fmsenterprise id="ABC">
<fscgroup id="US_group_A">
<fsc id="afsc1" address="http://127.0.0.1:4101">
<volume id="avol1" root="/avol1"/>
</fsc>
<fsc id="afsc2" address="http://127.0.0.1:4102">
<volume id="avol2" root="/avol2"/>
</fsc>
</fscgroup>
<fscgroup id="EU_group_B">
<fsc id="bfsc1" address="http://127.0.0.1:4201">
<volume id="bvol1" root="/bvol1"/>
</fsc>
<fsc id="bfsc2" address="http://127.0.0.1:4202">
<volume id="bvol2" root="/bvol2"/>
</fsc>
</fscgroup>
</fmsenterprise>
</fmsworld>
Multiple enterprises
share a common FMS
configuration.
Group 1 Group 2
SYSTEMS SYSTEMS SYSTEMS SYSTEMS
AN
LAN W
(owned) by one of the
enterprises
FSC 31 FSC 32
volABC311 volABC321
volABC312 volDEF221
fmsenterprise element
Define additional sites using the fmsenterprise element, which uses the
same configuration defined by the local enterprise. This arrangement allows
for an FSC to manage volumes owned by either site. Whatever routing
is defined in the local site is shared between the sites. (These multisite
enterprise elements have the DEF and XYX attributes in the following
configuration file. The advantage of this configuration is that a single FMS
configuration can be defined to manage multiple sites (databases). This
assumes that the common FSC can be physically shared between the sites.
<fmsworld>
<fmsenterprise id="ABC">
• Size the server pool appropriately. The pool-specific parameters are set in the
TC_ROOT\pool_manager\serverPooldatabase-name.properties file.
For more information, see Pool-specific configuration tuning.
Objects loaded on the Teamcenter server remain in the server memory throughout
the session. If unused objects are not removed, long-running sessions generate
significant memory usage which can cause memory errors.
To avoid these errors, Teamcenter provides automatic cleanup of unused objects. The
default configuration of the memory cleanup operation unloads unused objects from
the server in the order they were last accessed. The least recently accessed objects
are unloaded first. The operation begins when the memory server size reaches
12,000 KB, and stops when the memory server size reaches 5,000 KB.
This default configuration of memory cleanup behavior is sufficient for most sites.
The default settings are not optimal when:
• Users work with very large assemblies.
• All sessions are short-running sessions with minimal server memory needs;
therefore, the site has no need of automatic memory cleanup.
Automatic memory cleanup unloads unused objects from the server in the order
they were last accessed. The least recently accessed objects are unloaded first. The
default settings initiates memory cleanup when the memory server size reaches
12,000 KB, and stops when the memory server size reaches 5,000 KB.
You can fine-tune automatic cleanup functionality by modifying the default values of
the following preferences.
Default
Preference value Description
UNLOAD_TRIGGER_CEILING 12000 Initiates the memory cleanup
operation.
Specifies (in kilobytes) what
memory size must be reached to
initiate the unloading of unused
objects from the server memory.
UNLOAD_TRIGGER_FLOOR 5000 Stops the memory cleanup
operation.
Specifies (in kilobytes) what
memory size must be reached
to stop the unloading of unused
objects from the server memory
after memory cleanup begins.
Default
Preference value Description
UNLOAD_MINIMUM_LIFETIME 1800 Determines which unused objects
are qualified for memory cleanup,
based on when objects were last
accessed.
Specifies (in seconds) when an
object was last accessed. Objects
accessed more recently than the
specified value are not removed
from server memory.
UNLOAD_LOGGING_LEVEL 0 Determines the level of detail
logged in the in-session and
end-session reports sent to the
.unloadlog log file.
0 disables logging.
Values 1 through 4 enable logging
in progressively more detail.
For more information about
memory cleanup logging, see
Server memory cleanup log files.
Users can determine the necessary settings by estimating an average object size of
.5 KB. For example, with the UNLOAD_TRIGGER_CEILING default setting of
12000 KB, automatic unload occurs when approximately 24,000 objects are loaded.
The 5,000 KB default setting for the UNLOAD_TRIGGER_FLOOR preference
means unloading continues until approximately 10,000 objects remain in the
unloadable memory area.
These setting are adequate for most two-tier environments, including the default
Teamcenter installation running only the Foundation template.
• Determine the number of users at the site accessing the server concurrently.
• Determine the size of the Teamcenter server instance (including all site
customizations and configurations) immediately after user logon.
• Divide the amount of free memory available by the number of concurrent users
to determine the average size of memory required for each user per session.
For example, if the average size of the free memory required per user session is
100 MB, and if users typically work with assemblies of containing approximately
100,000 objects, the site administrator must increase the value of the
UNLOAD_TRIGGER_CEILING preference to a minimum value of 50,000 KB,
based on an estimated average size for an object being 0.5 KB. Because the total size
of free memory in this case is 100 MB, a value between 50,000 KB and 100,000
KB is acceptable, but it should not exceed 100,000 KB to give the optimal result
for all users.
unloadable objects, the total number of unloaded objects, the total number of unload
operations, the average time for an unload operation, and so on.
Determine the level of detail reported to the log file by setting the
UNLOAD_LOGGING_LEVEL preference to a value between 0 and 4. Setting this
preference to 0 disables logging.
Level 0
In-session report Creates no log file.
No log information is reported.
End-session report N/A
Level 1
In-session report Specifies the number of objects in the cache.
Specifies the number of objects removed from the cache.
Specifies the time (in seconds) to unload the cache.
Specifies the number of objects remaining in the cache.
Level 2
In-session report Specifies the number of objects in the cache.
Specifies the number of objects removed from the cache.
Specifies the time (in seconds) to unload the cache.
Specifies total memory usage of all areas (in bytes) before
unloading.
Specifies total memory usage of all areas (in bytes) after
unloading.
Specifies the number of objects remaining in the cache.
Level 2
End-session report Specifies the peak memory used by unloadable objects
for the entire session.
Specifies the least amount of memory used by unloadable
objects for the entire session.
Specifies the total number of objects unloaded.
Specifies the total number of unloading operation
requests.
Specifies the total number of actual unloading operations.
Specifies the average time of an unloading operation.
Level 3
In-session report Specifies the number of objects in the cache.
Specifies the number of objects removed from cache.
Specifies the time (in seconds) to unload the cache.
Specifies total memory usage of all areas (in bytes) before
unloading and before callbacks. Usage shown by area.
Specifies total memory usage of all areas (in bytes) after
unloading and before callbacks. Usage shown by area.
Specifies the number of objects remaining in the cache.
Level 4
In-session report Specifies, if adding to the cache:
Object String =object string , type: type of object,
time: when it was accessed
Specifies, if removing from the cache:
Unloading Object: Object String =object string ,
type: type of object, time: when it was accessed
Specifies the number of objects in the cache.
Specifies the number of objects removed from cache.
Specifies the time (in seconds) to unload the cache.
Specifies total memory usage of all areas (in bytes) before
unloading and before callbacks. Usage shown by area.
Specifies total memory usage of all areas (in bytes) after
unloading and before callbacks. Usage shown by area.
Specifies the number of objects remaining in the cache.
Shared memory
• Types
• Property descriptors
• Constants
• From TEM, select the Generate Server Cache check box in the Foundation
Settings panel.
For more information, see the Teamcenter Environment Manager Help.
For more information, see the Preferences and Environment Variables Reference.
To force the regeneration of the cache, even though no metadata changes exist in the
database, run the generate_metadata_cache utility using the -force argument.
For more information, see the Utilities Reference.
The memory backing store files represent the persistent cache for the shared memory
contents. As long as the physical backing store file exists, the file contents are used
for the Text Server shared memory data on that machine. The initial XML text files
are only read and parsed by the very first Teamcenter server process, to populate
the shared memory cache. Subsequent processes use the shared memory technique.
Updating the XML files through installation or customization requires a refresh of the
shared memory cache, which is done by removing the backing store files (its persistent
representation). For more information, see Remove memory backing store files.
Shared memory functionality consumes semaphores. Each time a process stores a
shared memory map file in a new location, a new semaphore is created. When a
process reuses a location for a shared memory map file, the same semaphores are
reused.
The UNIX operating system does not relinquish semaphores when processes are
complete. If new locations are routinely created for shared memory mapping files, the
semaphore count eventually reaches the UNIX operating system limit. The following
message displays and the system reverts to in-process memory functionality.
ACE_Malloc_T<ACE_MEM_POOL_2, ACE_LOCK, ACE_CB>::ACE_Malloc_T: Not enough space
If you a running on a UNIX platform, you can ensure you do not exceed the
semaphore limit by defining a fixed directory for shared memory mapping files. For
more information, see Define a fixed directory for shared memory map files.
3. Log on as root.
The first process started after this change creates the shared memory map files and
required semaphores. All following processes use this existing information, with no
need to re-create the map files or additional semaphores.
This functionality creates a backing store file with a .mem extension. The
backing store file contains data for preferences definitions, default values, and
overlay values. If the file is deleted, another is automatically created by the next
Teamcenter server process. The backing store file is stored in the TC_TMP_DIR/
TC_VERSION_STRING/db_siteID/Preferences directory.
This functionality is implemented with the TC_USE_PREFS_SHARED_MEMORY
environment variable, which is turned ON by default. For more information about
this environment variable, see the Preferences and Environment Variables Reference.
Note When changes are made from a different host using the same database, the
changes are updated on that host, but not on the first host. The next new
Teamcenter server processes begun on the first host updates the shared
memory segment and the changes affect all the processes on that host.
For example, consider a pool of servers in which two are running. One of
these two servers creates a preference with a protection scope of Site. In this
situation, the other running server does not see the preference until the rich
client is refreshed. Any servers that start after the preference was created
see the new preference immediately.
3. Log on as root.
The first process started after this change creates the shared memory map files and
required semaphores. All following processes use this existing information, with no
need to re-create the map files or additional semaphores.
o Set the JVM heap generational sizes to be appropriate for the GC algorithms
and available heap.
5. Log on using the default user name and password plmmonitor and localhost,
respectively.
The Web application metrics appear.
Metric Description
Abandoned Servers Servers are assigned, but attempts to connect fail.
No Server Available The Web tier is unable to assign a server to a user
because none are available.
Server Comm Failure A Teamcenter server closed the connection while
the Web tier was waiting for a response.
Failed Login Attempts A user provided invalid credentials.
Number Pending The number of client requests for which the Web
Requests tier is awaiting a response.
Long-running Requests The Web tier waited longer than the specified time
Current for a server response
Long-running Request The number of requests taking longer than the
Completed specified amount of time to complete.
Grave Events Fatal or unexpected errors occurring in the Web tier.
Tip The contents of the e-mail notifications are generated from the
/webtierMonitorConfigInfo.xml file. (This is a companion file to the
webtierMonitorConfig.xml file.) For a complete list of possible causes and
recommended actions for Web tier monitoring, see this file.
This file is stored in the EAR file by default. A copy can be placed on the
application sever’s current directory to override the default version.
Configure Web tier metrics and logging behavior to better administer Web tier
processes.
Enable Web tier metrics in the pref_export.xml file. This file is stored in the EAR
file by default. A copy can be placed on the application sever’s current directory
to override the default version.
• Use the RunHtmlAdapter element to run the JMX HTML adapter for the
Web tier upon startup.
• Disable_Alerts
Enables monitoring of all the metrics listed in the file, but disables all
notifications of critical events, regardless of individual notification settings
on any metric.
• Off
Disables monitoring of all the metrics listed in the file.
• EmailResponder id
Specify an identification for this e-mail responder. Multiple e-mail
responders can be configured, in which case the identifiers must be unique.
• protocol
Specify the e-mail protocol by which notifications are sent. SMTP is the
only supported protocol.
• hostAddress
Specify the server host from which the e-mail notifications are sent. In a
large deployment (with multiple server managers, or the Web tier running on
different hosts) the host address identifies the location of the critical events.
• fromAddress
Specify the address from which the notification e-mails are sent.
• toAddress
Specify the address to which the notification e-mails are sent. You can
specify multiple e-mail addresses, separated by semi-colons.
• suppressionPeriod
Specify the amount of time (in seconds) to suppress e-mail notification of
critical events.
For more information, see the suppression period example in Introduction to
monitoring.
• emailFormat
Specify the format in which the e-mail is delivered. Valid values are html
and text.
• LoggerResponder id
Specify an identification for this logger responder. Multiple logger responders
can be configured, in which case the identifiers must be unique.
• logFileName
Specify the name of the file to which critical events are logged.
• suppressionPeriod
Specify the amount of time (in seconds) to suppress logging of critical events
to the log file.
For more information, see the suppression period example in Introduction to
monitoring.
5. Configure the criteria for a critical event for any of the metrics in the file by:
a. Specifying a particular EmailResponder.
• Alert
Collect metric data, display results in the MBean view (within the server
manager administrative interface) for this metric, and send e-mail
notifications when critical events exceed the specified threshold.
• Off
No metric data is collected.
d. Setting the remaining values to specify criteria that must be met to trigger a
critical event for the metric.
<ResponderRef id="EmailResponder1"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
<Metric name="No Server Available" id="NoServerAvailable" maxEntries="100" mode="Alert"
metricType="integer"
description="The server pool was unable to assign a tcserver.">
<ThresholdWithPeriod>
<ThresholdValue name="NumberNoServerAvailable" value="10"
description="Alert if number of times no server available exceeds this limit
during time period" />
<ThresholdPeriod name="TimePeriodInSec" value="600"
description="Period over which this metric is monitored for exceeding threshold" />
</ThresholdWithPeriod>
<Responders>
<ResponderRef id="EmailResponder1"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
<Metric name="Failed Login Attempts" id="FailedLoginAttempts" maxEntries="100"
mode="Collect" metricType="integer"
description="Excessive failed login attempts have been detected.">
<ThresholdWithPeriod>
<ThresholdValue name="NumberFailedLoginAttempts" value="2"
description="Alert if number of failed login attempts exceeds this limit
during time period" />
<ThresholdPeriod name="TimePeriodInSec" value="600"
description="Period over which this metric is monitored for exceeding threshold" />
</ThresholdWithPeriod>
<Responders>
<ResponderRef id="EmailResponder2"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
<Metric name="Grave Events" id="GraveEvents" maxEntries="100" mode="Alert">
<Responders>
<ResponderRef id="EmailResponder2"/>
<ResponderRef id="LoggerResponder1"/>
</Responders>
</Metric>
</MetricsConfig>
</ApplicationConfig>
Ensure the hard drive where the rich client is installed remains defragmented
and never exceeds 75 percent capacity.
One way to achieve near warm startup times in a cold situation is to warm the rich
client files found under the portal folder using the file warmer capability of the FCC
application. The file warmer loads the specified files from the hard disk to the disk
cache, effectively changing them to a warm state.
It is beneficial to configure file warmer functionality when all the following conditions
exist at your site:
• The FCC can be started when the user logs on to the operating system or can be
manually started a few minutes before the rich client.
• The FCC can be kept active in memory until the user logs off.
• The client workstation employs very fast media, such as solid-state disk (SSD)
media. In this situation, startup is already as fast as possible.
• There is not enough hard disk cache on the machine to cache the necessary rich
client startup files. The hard disk cache requirement is related to the amount of
memory (RAM) on the system more than the capacity of the hard disk media.
Siemens PLM Software recommends a minimum of 512 MB of available hard
disk cache, which provides approximately 2 GB of RAM on Windows.
• There is significant competition for the available disk cache. For example,
additional third-party applications are using a similar technique to warm their
files.
If all the requiring conditions are met, and none of the preventative conditions
exist, configuring the FCC to warm rich client startup files can improve startup
performance.
For more information, see Configuring the FCC file warmer.
2. Set the filewarmer.filelist option to the name and location of the file containing
the list of files to be warmed.
If a list file is not specified, file warming is disabled. If the file is modified, you
must restart the FCC for the changes to take effect.
3. Set the filewarmer.interval option to the amount of time (in seconds) between
warming updates.
The default setting is 1800 (30 minutes.)
2. List the files and directories to be included (or excluded) from file warming,
using the following formatting rules:
• Commented lines (lines beginning with a hash mark (#)) and blank lines
are ignored.
The specified directories are scanned at the start of each cycle, allowing the
file warmer to adapt to dynamic content changes. The directories are scanned
recursively, unless otherwise specified.
If the same file or directory is listed as both included and excluded, the exclusion
is ignored.
Example Siemens PLM Software recommends setting the following paths:
@include
RAC-install-path\portal\plugins
RAC-install-path\portal\features
RAC-install-path\portal\registry
RAC-install-path\portal\configuration
RAC-install-path\portal\Teamcenter.exe
RAC-install-path\portal\Teamcenter.ini
RAC-install-path\portal\.eclipseproduct
RAC-install-path\portal\jre\lib\rt.jar
@exclude
RAC-install-path\portal\plugins\FoundationViewer
If this file does not exist, copy the fcc.properties.template file to the
$FMS_HOME directory and rename it as fcc.properties.
Use the full path to the properties file. Use double backslashes as directory
separators.
• UNIX systems:
filewarmer.properties=/usr/bin/teamcenter/fcc/filewarmer.properties
Use the full path to the properties file. Use single forward slashes as
directory separators.
Use the full path to the properties file. Use double backslashes as directory
separators.
• UNIX systems:
-Dfilewarmer.properties=/usr/bin/Teamcenter/fcc/filewarmer.properties
Use the full path to the properties file. Use single forward slashes as
directory separators.
Warning On Windows Vista and later (including Windows 7), JRE shutdown
hooks are not honored, preventing the FCC from closing cleanly. If the
TCCS/FCC instance remains running when users log off (or shut down)
these operating systems, the FCC segment cache may be corrupted.
Siemens PLM Software recommends you add the fccstat -kill command
to all user logoff scripts and to any relevant Windows shutdown scripts
for Teamcenter clients running on these operating systems .
For more information about running the fccstat -kill command, see
method 2 in Shutting down a TCCS/FCC instance. For more information
about working with Windows shutdown scripts, see the Microsoft
documentation at:
http://technet.microsoft.com/en-us/library/cc753404.aspx
d. Start TCCS.
call %FMS_HOME%\bin\fccstat –start
If the FCC does not start correctly, exiting with an error code, the FCC sets
ERRORLEVEL to the correct FCC error code. You can use this value for
debugging.
For example:
set _EL=%ERRORLEVEL%
• Multi-user system:
C:\Users\user-name\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup
Windows XP/2000
• Single-user system:
C:\Documents and Settings\All Users\Start
Menu\Programs\Startup
• Multi-user system:
C:\Documents and Settings\user-name\Start
Menu\Programs\Startup
• Windows systems:
set AUX_PATH=C:\new\path;%AUX_PATH%
Note Adding too many paths to the AUX_PATH environment variable defeats the
purpose of shortening PATH.
This significant reduction in the size of the backpointer table can improve product
performance. To take advantage of this performance improvement, you must run the
clean_backpointer utility on your Teamcenter database after upgrading from a
previous version to Teamcenter 9.1 (or a later version). This utility is not run during
upgrade, as the cleanup operation may be time-consuming.
The utility scans the backpointer table for relation_type object references and
ImanRelation primary and secondary object references, confirms their existence in
the ImanRelation table, and deletes the instances from the backpointer table.
The utility’s performance varies from site to site, depending on infrastructure
elements such as database load, network performance, server configuration, and so
on. Because performance varies, Siemens PLM Software recommends following
these best practices:
1. Run the utility with the -m argument set to INFO to determine the number of
objects stored in the backpointer table.
2. Run the utility with the -s argument set to a few thousand objects and note
how long it takes to delete the objects.
3. Use the results of these first two operations to determine the length of time it
takes to clear the entire backpointer table (-s=ALL) and schedule accordingly.
For more information about the utility, see the Utilities Reference.
10 Logging
10 Logging
Introduction to logging
Log files are generated in each Teamcenter tier, as well as in third-party applications
used to provide Teamcenter capabilities. Logging is comprised of the following
components:
• Log Manager
Provides a mechanism to consolidate log files generated across the Teamcenter
deployment.
For more information, see Using the Log Manager.
• Accepts all log files, including legacy logs in any format, and logs based on a
standard set of loggers.
• Writes all log files to a location that is managed by the Log Manager software.
• Uses TPTP transport over RMI for delivery of the log files.
• Supports both process logs and task-based logs (where a transaction is executed
on behalf of a specific user request).
Log files are divided into two types: task logs and process logs. Task logs represent
the output of long-running service processes, such as those found in the Dispatcher
Server system. Task logs are stored in a directory named by the GUID or task ID
and can be distributed on many computers. Without Log Manager this requires
you to search all the different log directories based on a GUID. The Log Manager
provides the capability to search all task logs deployed throughout the system for a
specific task’s log files, or for all failed log files. This supports analysis of translation
failure to identify and correct root causes.
Any log file that is not based on a task ID is considered a process log. This includes
most process log files such as syslog files, FSC logs, audit logs, and so on, which may
include log records on behalf of multiple users performing any number of tasks. The
Log Manager accepts and provide access to all process logs that are placed in a log
volume. Service processes are configured to write log information to a specific log
volume. The Log Manager supports type designations for the various process log
files to enable you to search for and retrieve specific types of log files.
The Log Manager employs a log writer to capture log files to a local or mounted log
volume directory. The log writer software provides interfaces for capturing task
and process logs as well as metadata for each log file. Log file metadata includes
information such as the log file completion status, the host and process name that
captured the log file, and the log file type. The log writer writes log data and log
metadata directly to either local or mounted disk (log volume). The primary function
of the Log Manager service is to query and retrieve log file metadata for display in
an administrator’s or user’s interface. The Log Manager provides general query
interface for metadata such as completion status or query by a specific task ID.
The benefits of the Log Manager are:
• Direct to disk log capture
Efficient capture to disk is essential to avoid a negative impact on the
performance of critical system functions. Once captured, logs may be searched or
loaded into databases as appropriate.
• Centralized access
Although logs are captured in a globally distributed manner, users and
administrators can view the accumulated logs together to understand overall
system operation.
• Common interfaces
A standard set of log capture APIs, file formats, and log retrieval APIs is
provided to simplify the process of log monitoring.
• Message
• Logger name
You can dynamically change logging levels for the system log file.
You must configure loggers to write messages of the desired priority level. Setting a
logger at DEFAULT causes it to inherit its priority level from its parent logger.
For more information about configuring logging levels, see Configuring business
logic server logging.
this directory are affected. This method is useful for updating deployment
environments.
For information about using this file, see Configure logging with the
logger.properties file.
Note Changes to the file take effect only after the server is restarted. You
can use the Restart Warm Servers button in the server manager
administrative interface to restart all warm servers and implement the
changes to the logging levels.
For more information about using the Restart Warm Servers button in
the J2EE server manager administrative interface, see Administering
the pool’s server manager.
For more information about using the Restart Warm Servers button in
the .NET server manager administrative interface, see Restarting warm
servers.
• You can dynamically change logging levels for a particular user session using
the J2EE server manager administrative interface.
Changing logging methods in this manner affects only the selected business logic
server, and the changes last only throughout the user session.
For information about using this method, see Configure business logic server
manager logging in the J2EE server manager administrative interface.
• Web tier
The Web tier routes client requests to business logic, serves static content to
clients, and processes login requests.
• Enterprise tier
The enterprise tier hosts business logic, applies security rules, and serves
dynamic content to clients.
• Resource tier
The log correlation ID is a unique ID that records the path of a service request
starting from the Web tier through the enterprise tier. This log correlation ID
is recorded in the log messages on each tier that processes the request. The log
correlation ID for the browser-based client has the following structure:
Client-or-Proxy-Host.Unique-ID.User-Name.Request-Count
• Client-or-Proxy-Host indicates the client host name or the proxy server host
name.
• User-Name is the user name associated with the request. The default is set
to Anonymous.
In the browser-based client, the client sends the request from the Web browser
and this request is received first by the Web tier. The WebTier.log file records the
request with the correlation ID as follows:
DEBUG - cmh6p199.net.plm.eds.com.05340.Anonymous.00002 -
2011/04/21-02:00:38,223 UTC - cii6p199 - Begin - WebclientPreProcess
[com.teamcenter.presentation.webclient.actions.WebclientPreProcess.
handleAction(WebclientPreProcess.java:226):Thread[[ACTIVE]
ExecuteThread: ’0’ for queue: ’weblogic.kernel.Default (self-tuning)
’,5,Pooled Threads]]
…
The request path can be traced in the tcserver1.syslog file using the same log
correlation ID.
2011-04-20 22:03:03 cmnh6p199.net.plm.eds.com.05340.Anonymous.00002 -
Service Request: T2LWebMethodService:process_request_raw
Successfully loaded dynamic module D:\udu\ref\tc9.0.0.2011041800\wnti32\lib\libweb.dll
Loaded module D:\udu\ref\tc9.0.0.2011041800\wnti32\lib\libvis.dll 129c0000 90000
3cc8fdcd-4dd74f64-12a895a6-4c835394-1=libvis___1303160187 version = 9000.0.0.4104
Loaded module D:\udu\ref\tc9.0.0.2011041800\wnti32\lib\libweb.dll 12500000 4a8000
65af7f91-4e213a95-24a44db3-b6e6544-1=libweb___1303161766 version = 9000.0.0.4104
INFO - 2011/4/21-02:03:03.190 UTC - cmh6p199.net.plm.eds.com.05340.Anonymous.00002 -
Loaded library libweb - Teamcenter.Soa.TcServerUtil
tcscript took 0.078000s cpu, 0.085000s real to parse file - toplevel.html
On the next client request, this log correlation ID is updated with the authenticated
user name and an incremented request counter.
DEBUG - cmh6p199.net.plm.eds.com.05340.infodba.00003 -
2011/04/21-02:03:04,777 UTC - cmh6p199 - Begin - WebclientPreProcess
[com.teamcenter.presentation.webclient.actions.WebclientPreProcess.
handleAction(WebclientPreProcess.java:226):Thread[[ACTIVE]
ExecuteThread: ’0’ for queue: ’weblogic.kernel.Default (self-tuning)
’,5,Pooled Threads]]
Subsequent client requests use the same log correlation ID with an incremented
request counter until the client logs off or the client Web session times out.
JBoss logging
Component JBossWeb server
Logs transaction messages to log files stored within the application
Description
server directory structure.
Log file WebTier.log
Location jboss-4.0.5GA\bin\logs\WebTier\process\
Specify the LogVolumeLocation file by regenerating the tc.ear
file.
Configuration N/A
Location jboss-4.0.5GA\bin\logs\WebTier\metadata\process
Configuration N/A
WebLogic logging
Component WebLogic Web server
WebLogic logging
Logs transaction messages to log files stored within the application
Description
server directory structure.
Log file WebTier.log
bea\user_projects\domains\teamcenter\logs\WebTier
Location
\process\
Specify the LogVolumeLocation file by regenerating the tc.ear
file.
bea\user_projects\domains\teamcenter\logs\WebTier
Location
\metadata\process
Configuration N/A
WebSphere logging
Component WebSphere Web server
Logs transaction messages to log files stored within the application
Description
server directory structure.
Log file WebTier.log
IBM\WebSphere\AppServer\profiles\AppSrv01\logs
Location
\WebTier\process\
Specify the LogVolumeLocation file by regenerating the tc.ear
file.
Oracle logging
Component Oracle application server
Oracle logging
Logs transaction messages to log files stored within the application
Description
server directory structure.
Log file WebTier.log
Location oracle\10.1.3\OracleAS\j2ee\home\logs\WebTier\process\
Specify the LogVolumeLocation file by regenerating the tc.ear
file.
Configuration Run F:\tc_web\insweb.bat, select Modify, and then select Modify
Context Parameters. Set the LogVolumeLocation and click OK.
The new tc.ear is generated. Deploy it in the application server.
This creates a WebTier directory under LogVolume.
TC_TMP_DIR
Location
This value is typically C:\Temp on Windows and /tmp on UNIX.
Define the TC_TMP_DIR environment variable in the
Configuration
TC_DATA/tc_profilevars.bat file.
Multi-Site logging
Component Multi-Site
Multi-Site logging
Tracks actions performed on objects at a session level, such as
Description
imported or exported objects.
Log file idsmID.log
TC_TMP_DIR on the machine hosting the IDSM server.
Location
This value is typically C:\Temp on Windows and /tmp on UNIX.
Configuration N/A
Component Multi-Site
Description Diagnoses errors. Captures information, errors and warnings.
Log file idsmID.syslog
TC_TMP_DIR on the machine hosting the IDSM server.
Location
This value is typically C:\Temp on Windows and /tmp on UNIX.
Configuration N/A
Component Multi-Site
Tracks objects accessed from the database, and the activities
performed on those objects. This session log also performs a trace
Description
through software modules. Each time you invoke or exit a module,
the log manager posts an entry to this file.
Log file idsmID.jnl
TC_TMP_DIR on the machine hosting the IDSM server.
Location
This value is typically C:\Temp on Windows and /tmp on UNIX.
Configuration N/A
Component Multi-Site
Description Tracks actions performed on objects at a session level.
Log file odsID.log
TC_TMP_DIR on the machine hosting the ODS server.
Location
This value is typically C:\Temp on Windows and /tmp on UNIX.
Configuration N/A
Component Multi-Site
Description Diagnoses errors. Captures information, errors and warnings.
Log file odsID.syslog
Component Multi-Site
Tracks objects accessed from the database, and the activities
performed on those objects. This session log also performs a trace
Description
through software modules. Each time you invoke or exit a module,
the log manager posts an entry to this file.
Log file odsID.jnl
TC_TMP_DIR on the machine hosting the ODS server.
Location
This value is typically C:\Temp on Windows and /tmp on UNIX.
Configuration N/A
Component FMS
Description Contains log entries regarding server run-time operations.
Log file $FSC_ID.log
Location FSC_HOME/logs/FSC/process
Component FMS
Description Default console log file for response time logging
Log file FSC_host-name_user-ID_plmconsole.txt
Location FSC_HOME/logs/MLD/process
Configuration N/A
Component FMS
Contains sampled gauge values and threshold notifications. This
Description
file is overridden by any JMX interface configuration.
Log file FSC_host-name_user-ID_RTEvents.txt
Location FSC_HOME/logs/MLD/process
Configuration N/A
Component FMS
Description Contains response time tracing messages and logging.
Log file FSC_host-name_user-ID_RTTraces.txt
Location FSC_HOME/logs/MLD/process
Configuration N/A
Component FMS
Contains notifications processed by remote Response Time
Description
GaugeListeners and TraceListeners.
Log file FSC_host-name_user-ID_RTRemotes.txt
Location FSC_HOME/logs/MLD/process
Configuration N/A
Component FMS
Description Metadata file for the FSC_host-name_user-ID_fsc.log
Log file FSC_host-name_user-ID_fsc.log.xml
Location FSC_HOME/logs/MLD/metadata/process
Configuration N/A
Component FMS
Component FMS
Description Metadata file for the FSC_host-name_user-ID_RTTraces.txt
Log file FSC_host-name_user-ID_RTTraces.txt.xml
Location FSC_HOME/logs/MLD/metadata/process
Configuration N/A
Component FMS
Description Metadata file for the FSC_host-name_user-ID_RTRemotes.txt
Log file FSC_host-name_user-ID_RTRemotes.txt.xml
Location FSC_HOME/logs/MLD/metadata/process
Configuration N/A
Component FMS
Description Metadata file for the FSC_host-name_user-ID_RTConsole.txt
Log file FSC_host-name_user-ID_RTConsole.txt.xml
Location FSC_HOME/logs/MLD/metadata/process
Configuration N/A
Translation server
The translation server asynchronously distributes translation requests to machines
with the resource capacity to execute the requests. A grid technology manages the
job distribution, communication, translator execution, security, and error handling
for translation requests. Translation requests are triggered based by workflow, data
checkin, batch mode, or on-demand operations.
Location LogVolumeDirectory/TSTK/process
Configuration N/A
Mode Description
Read-Only Mode Places Teamcenter into read-only state. This
state holds writing files to the volume during
backup.
Blobby Volume Mode Places Teamcenter in blobby (temporary) volume
mode. Teamcenter can be switched into this
mode after the third-party backup software
takes a snapshot of the data, thus allowing
continuous availability.
The following steps describe the process flow of a third-party integrated backup:
1. The third-party backup software requests that Teamcenter freeze all operations
on its file system volumes.
Note The method of the request depends on how the third-party backup
software is integrated with Teamcenter. In a loosely coupled integration,
the request can be a reminder or e-mail to the system administrator to
begin the backup process. A tightly integrated system can trigger the
Read-Only mode using the backup_modes command line utility.
4. The third-party backup software puts the database in hot backup mode and
creates a snapshot of the file system.
5. Third-party storage management systems start the backup of database and file
system volumes.
Optionally, during the backup, the third-party software can request that
Teamcenter operate in blobby volume mode. The blobby volume (a temporary file
system area) serves as an alternate volume location for file writes during the hot
backup, allowing for continuous availability. The blobby mode can be triggered
using the backup_modes command line utility.
• Target database
Of these components, only the RMAN executable and target database are required.
RMAN automatically stores its metadata in the target database control file, so
the recovery catalog database is optional. Siemens PLM Software recommends
maintaining a recovery catalog. If you create a catalog on a separate machine and
the production machine fails completely, you have all the restore and recovery
information you need in the catalog.
When configuring backup and recovery, you must specify all of the following items
to ensure a complete recovery:
• The database (such as Oracle, MS SQL, DB2).
• All local Business Modeler IDE project folders, including project folders within
source control management (SCM) systems.
You can hot backup the database and volumes. You must cold backup the remaining
items.
Benefits of RMAN
The following table lists a comparison between the Oracle Recovery Manager
(RMAN) and user-managed methods.
Features of RMAN
Feature Description
Incremental backups Up to four levels; level 0 and levels 1 and 4.
Feature Description
Corrupt block detection During backup:
• v$backup_corruption, v$copy_corruption
Restore
Easy management Distributing database backups, resources, and recoveries
across clustered nodes in an Oracle parallel server.
Performance • Automatic parallelization of backup, restore, and
recovery.
Note RMAN was introduced in Oracle version 8.0 and is not compatible with
Oracle databases prior to version 8.0. For more information about Oracle’s
RMAN, see the following URL:
http://download.oracle.com/docs/cd/B19306_01/backup.102/b14193.pdf
Teamcenter classes. These attribute values are copied and therefore do not impact in
the base classes from where they were derived.
The following graphic shows the single file recovery object model.
The recovery process starts in the background, to compensate for the lead time
in recovering the file from the backup medium. Specify the time intervals of this
functionality using the following preferences:
• TC_sfr_recovery_interval
Specifies, in seconds, how often the system checks for recovered files after a
user-initiated single file recovery action is activated. For additional information,
see the Preferences and Environment Variables Reference.
• TC_sfr_process_life_time
Specifies, in minutes, how long the system continues to check for recovered
files after a user-initiated single file recovery action is activated. For more
information, see the Preferences and Environment Variables Reference.
7. On the General tabbed page, choose a type of backup from the Backup options.
After you create a complete database backup (using the Database-complete
option), you must also create a Transaction log backup. To do this, open the SQL
Server Backup dialog box and select the Transaction log backup option.
a. Click Add.
The Backup Destination dialog box is displayed.
e. Click OK.
The SQL Server Backup dialog box is displayed again.
f. Select the device or file you created from the Destination list.
9. Select the appropriate overwrite option for your backup. You can use this option
to add multiple backups to file or device or to overwrite previous backups with
the most current backup.
Warning Selecting the Schedule box automates the database backup process.
Siemens PLM Software does not recommend using this option,
because it only backs up the database. It does not automate the
backup of volumes.
12. Select the options that are appropriate for your organization.
Disadvantages
• Only utilities that interact with the SQL Server through the VDI can issue the
backup and restore command snapshot option. Users cannot issue the snapshot
option directly.
• SQL Server supports only the backups and restorations saved in the snapshot
format. It does not support differential and transaction-log backups saved as
snapshots.
• Backup/restore of the SQL Server database is possible using the SQL Server
Enterprise Manager or VDI. However, an integrated solution to back up
both the SQL database and volumes is not possible using these approaches.
Backup/recovery of Teamcenter volumes must be performed using the traditional
copy and paste method.
• VDI combined with the third-party integrations can effectively back up and
restore Teamcenter metadata and math data that require minimal downtime
and require SQL Server 2000/2005 to be in hot backup mode. This combination
enables you to achieve greater flexibility by ensuring 24 X 7 availability.
A Glossary
A Glossary
AM
See Access Manager (AM).
assigned FSC
FMS server cache assigned as the volume or cache server for an FMS client cache.
Each FMS client cache requires an assigned FSC to provide it with access to files. An
assigned FSC is typically the FSC nearest to the client host. In small deployments,
an assigned FSC can also serve as the parent FSC.
blobby volume
Alternate volume used to store data while backing up volumes and databases. The
blobby volume provides continuous Teamcenter availability.
client
Role played by a software component of a system when it requests particular services
be performed on its behalf by another entity, a server. See also server.
client tier
Teamcenter architectural tier that comprises the Teamcenter clients, Teamcenter
integrations with third-party applications, and the third-party applications
associated with the integrations.
corporate server
Host computer at the center of a Teamcenter network. This host contains the
Teamcenter application root directory, Teamcenter data directory, licensing, File
Management System (FMS), and volumes. For installations that include the Web
tier (four-tier architecture), the corporate server also contains the Teamcenter server
manager. Multiple application clients can map to or mount the corporate server.
data model
Abstract model that describes how data is represented and used.
distribution server
See rich client distribution server.
enterprise tier
Teamcenter architectural tier that comprises a configurable pool of Teamcenter
C++ server processes and a server manager. Larger sites can distribute the pool of
server processes across multiple hosts. Smaller sites can run the pool of servers on
the same host as the Web tier.
• FMS file caching enables placing the data close to the user, while maintaining a
central file volume and database store.
FMS
See File Management System (FMS).
default values for server caches and client caches, such as maximum sizes. Values
defined in the server cache configuration file and in the client cache configuration file
can override the default values defined in the master configuration file.
four-tier architecture
Teamcenter architecture that includes four tiers: resource tier, client tier, Web tier,
and enterprise tier. Contrast with two-tier architecture.
four-tier deployment
Deployment of the Teamcenter four-tier architecture. The Web tier, enterprise tier,
resource tier, and client tier can each be hosted on the same or separate computers.
FSC
See FMS server cache (FSC).
FSC group
Group of server caches defined in the FMS master configuration file.
master FSC
FMS server cache that reads the master configuration file directly from the FMS
master host. An FSC is configured either to read the master configuration file
directly from the master host or to download it from another FSC with access to it.
Oracle home
Directory in which Oracle software is installed on the Oracle server node.
preference
Configuration variable stored in a Teamcenter database and read when a Teamcenter
session is initiated. Preferences allow administrators and users to configure many
aspects of a session, such as user logon names and the columns displayed by default
in a properties table.
QPL server
Quick part locator server. It provides a qpl daemon that can be used with
DesignContext in the rich client. The qpl daemon coexists with all Teamcenter
daemons. Without this daemon DesignContext does not work.
resource tier
Teamcenter architectural tier comprising the database server, database, file servers,
and volumes.
rich client
Java-based user interface to Teamcenter installed on user workstations. The rich
client accesses Teamcenter databases using a remote or local server. Compare to
thin client.
server
System software component that performs a specifically defined set of software
services on behalf of one or more clients. In a typical Teamcenter installation,
servers are centralized on dedicated hosts that support a large number of clients.
Clients are distributed on hosts connected to the servers via various networking
techniques. See also client.
server manager
Process that manages a pool of Teamcenter server processes in a deployment of
the four-tier architecture. The server manager starts and times out a configurable
number of server processes to communicate with the Teamcenter database. A
server assigner process assigns available server processes to user sessions. The
server manager communicates with the Web tier application using either TCP or
multicast protocol.
server pool
Pool of Teamcenter server processes running in the enterprise tier. A small
deployment may have only one pool of server processes. For larger deployments, the
pool of server processes is distributed as subpools across multiple hosts, with a
server manager for each subpool. Server pools are applicable for deployments of the
Teamcenter four-tier architecture only.
site
Individual installation of Teamcenter comprising a single Teamcenter database,
all users accessing that database, and additional resources such as hardware,
site ID
Unique identifier of a Teamcenter site. The site ID is used to generate internal
identifiers for Teamcenter objects that must be unique throughout an enterprise.
Once established, site IDs should not be modified.
site name
Unique name of a Teamcenter site stored in the database as a user-defined character
string.
system administrator
Teamcenter user who is a member of the system administration group.
thin client
Teamcenter user interface that provides a streamlined browser-based view of product
information stored in a Teamcenter database. The thin client is configured in the
Web tier, which creates and serves its Web pages to the client. Compare to rich client.
two-tier architecture
Teamcenter architecture that includes a resource tier and a client tier. The resource
tier comprises the database server and database. The client tier comprises the
Teamcenter rich client, third-party applications that integrate with the rich client,
and a local server. This architecture supports only the Teamcenter rich client.
Contrast with four-tier architecture.
two-tier deployment
Deployment of the Teamcenter two-tier architecture. In a typical deployment of the
two-tier architecture, the rich client and its local server are installed on a user’s
workstation as are third-party applications that integrate with the rich client. The
database server and the Teamcenter corporate server are installed on one or more
separate computers.
volume
Operating system directory controlled by Teamcenter and used to store the files
managed by Teamcenter. When a user performs an action that causes Teamcenter
to create a file, the file is created in the Teamcenter volume. Users cannot directly
access the files in Teamcenter volumes; they must do so via a Teamcenter session.
Web tier
Teamcenter architectural tier that comprises a Java application running in a Java
2 Enterprise Edition (J2EE) application server. The Web tier is responsible for
communication between the client tier and enterprise tier.